Back to Intelligence

NASA Social Engineering Campaign — Detection and Defense Guide

SA
Security Arsenal Team
April 24, 2026
5 min read

Introduction

The Office of Inspector General (OIG) for the National Aeronautics and Space Administration (NASA) recently disclosed a significant security incident involving a targeted spear-social engineering campaign. A Chinese national, posing as a U.S. researcher, successfully duped NASA employees and other government entities, universities, and private companies into handing over sensitive information. This scheme specifically targeted critical U.S. defense software and intellectual property, violating export control laws.

For defenders, this serves as a stark reminder that the human element remains the most variable and exploitable attack vector. Technical controls like firewalls and EDR are often bypassed when a trusted insider is manipulated. This post outlines the technical indicators of such a campaign and provides actionable detection and remediation steps.

Technical Analysis

While this incident is rooted in social engineering rather than a specific software vulnerability (CVE), the attack chain involves technical behaviors that defenders can hunt for. The attacker established a fraudulent persona (a U.S. researcher) to build trust. Once rapport was established, they requested specific technical documents, source code, or proprietary data under the guise of academic collaboration. This often led to the unauthorized transfer of controlled files via email or cloud storage.

  • Affected Platforms: Email platforms (e.g., Microsoft 365, Google Workspace), File Shares, Cloud Storage providers.
  • Attack Vector: Spear-phishing / Business Email Compromise (BEC) techniques.
  • Objective: Exfiltration of controlled technical data (ITAR/EAR violations).
  • Exploitation Status: Confirmed active exploitation (successful data exfiltration). The attacker utilized "spear-social engineering," implying a highly targeted, low-volume approach designed to evade bulk phishing filters.

Detection & Response

Detecting these campaigns requires looking for anomalies in data egress and communication patterns rather than just malware signatures. Defenders should focus on large file transfers to non-corporate domains and access to sensitive documents by unusual processes or users.

SIGMA Rules

YAML
---
title: Potential Sensitive Data Exfiltration via Email
id: 9a8b7c6d-5e4f-3a2b-1c9d-0e8f7a6b5c4d
status: experimental
description: Detects potential data exfiltration via email by identifying messages with attachments sent to non-corporate or personal domains, a common tactic in social engineering scams.
references:
  - https://attack.mitre.org/techniques/T1567/
author: Security Arsenal
date: 2026/04/06
tags:
  - attack.exfiltration
  - attack.t1567.001
logsource:
  product: office365
  service: exchange
detection:
  selection:
    Operation|contains: 'Send'
    AttachmentCount|gt: 0
  filter_corp:
    RecipientAddress|endswith:
      - '@nasa.gov'
      - '@yourdomain.com'  # Replace with your internal domain
  filter_personal:
    RecipientAddress|contains:
      - '@gmail.com'
      - '@yahoo.com'
      - '@outlook.com'
  condition: selection and not filter_corp and filter_personal
falsepositives:
  - Legitimate personal emails sent by employees.
level: medium
---
title: Unauthorized Access to Sensitive File Extensions
id: 1b2c3d4e-5f6a-7b8c-9d0e-1f2a3b4c5d6e
status: experimental
description: Detects access to sensitive file types (source code, technical drawings) in user directories or shared drives, which may indicate data staging for exfiltration during a social engineering engagement.
references:
  - https://attack.mitre.org/techniques/T1005/
author: Security Arsenal
date: 2026/04/06
tags:
  - attack.collection
  - attack.t1005
logsource:
  category: file_access
  product: windows
detection:
  selection:
    TargetFilename|contains:
      - '.zip'
      - '.rar'
      - '.pdf'
      - '.docx'
      - '.cad'
      - '.src'
  filter_system:
    TargetFilename|contains:
      - '\Windows\'
      - '\Program Files\'
  condition: selection and not filter_system
falsepositives:
  - Legitimate user access to work documents.
level: low

KQL (Microsoft Sentinel / Defender)

KQL — Microsoft Sentinel / Defender
// Hunt for email exfiltration indicators involving external recipients
let TimeRange = 7d;
let CorpDomains = dynamic(['@nasa.gov', '@yourdomain.com']);
EmailEvents
| where Timestamp > ago(TimeRange)
| where ActionType == "Send"
| where RecipientEmailAddress !in (CorpDomains) and RecipientEmailAddress !has "@gov"
| where AttachmentCount > 0
| project Timestamp, SenderFromAddress, SenderDisplayName, RecipientEmailAddress, Subject, AttachmentCount, NetworkMessageId
| extend SuspiciousTLD = case(
    RecipientEmailAddress matches regex @"@(gmail|yahoo|outlook|protonmail|mail)\.(com|net|org)$", "Personal Email",
    "Other"
  )
| where SuspiciousTLD == "Personal Email"
| order by Timestamp desc

Velociraptor VQL

VQL — Velociraptor
-- Hunt for recent creation of archive files (zip, rar) which often indicate data staging for exfiltration
SELECT FullPath, Size, Mtime, Atime, Mode, uid, gid
FROM glob(globs="/Users/*/Downloads/*.zip", "/Users/*/Documents/*.zip", "/Users/*/Desktop/*.zip", "/home/*/Downloads/*.zip", "/tmp/*.zip")
WHERE Mtime > now() - 48h
  AND Size > 1024 * 100  -- Files larger than 100KB created in the last 48 hours

Remediation Script (PowerShell)

PowerShell
# PowerShell script to audit outbound email connections (Conceptual - requires Exchange Online PowerShell Module)
# This script checks for users who have sent emails to specific external domains recently.

# WARNING: This is a conceptual example. In a production environment, use the Exchange Online Management module and appropriate API throttling handling.

$ExternalDomains = @("gmail.com", "yahoo.com", "outlook.com")
$StartDate = (Get-Date).AddDays(-7)

Write-Host "Querying for potential exfiltration to external domains..." -ForegroundColor Yellow

# The cmdlet below requires the ExchangeOnlineManagement module
# Get-MessageTrace -StartDate $StartDate -EndDate (Get-Date) | Where-Object { $ExternalDomains -contains $_.RecipientAddress.Split('@')[-1] } | Select-Object SenderAddress, RecipientAddress, Subject, Received

Write-Host "Audit complete. Review results for unauthorized data transfers." -ForegroundColor Green
Write-Host "Action: Implement DLP policies to block sensitive data transfers to these domains." -ForegroundColor Cyan

Remediation

To defend against this type of sophisticated social engineering and prevent future data loss, implement the following controls:

  1. Data Loss Prevention (DLP): Immediately configure DLP policies to detect and block the transmission of sensitive keywords, source code, or technical documents (e.g., ITAR, EAR, IP) to personal email domains or unauthorized cloud storage providers.
  2. User Awareness Training: Conduct targeted security awareness training focused on "Researcher Recruitment" and "Academic Collaboration" scams. Train users to verify the identity of external researchers through official channels before sharing data.
  3. Egress Filtering: Restrict outbound traffic to known necessary cloud storage services. Block access to personal file-sharing sites from corporate networks.
  4. Least Privilege: Revoke unnecessary write access to sensitive file shares. Ensure that access rights are reviewed regularly, especially for high-value targets (e.g., engineers, researchers).
  5. Official Inquiry: If your organization was contacted by individuals matching this description, review logs for data transfers to those individuals and report the activity to the relevant OIG or law enforcement.

Related Resources

Security Arsenal Penetration Testing Services AlertMonitor Platform Book a SOC Assessment vulnerability-management Intel Hub

sigma-rulekql-detectionthreat-huntingdetection-engineeringsiem-detectionsocial-engineeringnasaapt

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.

NASA Social Engineering Campaign — Detection and Defense Guide | Security Arsenal | Security Arsenal