An attacker can begin by compromising the payload of a satellite, exploiting vulnerabilities in its software or hardware. From there, the attacker can escalate their access to the satellite's main platform, potentially gaining control over critical systems, communications, and payload operations.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.