#1 Trending Cybersecurity News & Magazine
Wednesday, September 13, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    2023 Cyber Strategy

    US Department of Defense 2023 Cyber Strategy Reflects Lessons from Russia-Ukraine Conflict

    Save the Children cyber attack

    BianLian Targets Charity Organization Save the Children, Triggers Angry Reactions Online

    Freecycle Data Breach

    Freecycle Data Breach: 7 Million Users at Risk, Company Urges Immediate Password Reset

    Airbus Cyber Attack

    Airbus Cyber Attack: Work of ‘USDoD’ Hacker, Linked to Turkish Airlines Employee Account Hack

    Least Preferred Cybersecurity Certifications

    The Least Preferred Cybersecurity Certifications: Market Trends Analysis by The Cyber Express

    most preferred cybersecurity certifications, Market Trends Analysis by The Cyber Express

    The Cyber Express Market Trends Survey Reveals Top 5 Cybersecurity Certifications in 2023

    ICTA Cyber Attack

    ICTA Cyber Attack: Loss of 5000 Email IDs Attributed to Lack of Backups, Administrative Issues

    COVESA data breach

    Largest Ford Dealership in Spain COVESA Hit by Data Breach, 8BASE Claims Attack

    Pathlegal cyber attack

    Cyber Clash Between Indian and Indonesian Hackers Escalates, PathLegal Becomes Latest Victim

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    National Cyber Workforce and Education Strategy

    Everything You Need to Know About the National Cyber Workforce and Education Strategy (NCWES)

    Montclair cyber attack

    Montclair Cyber Attack Kicks Up the Ransom Payment Dilemma

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    Cyble Partner Network

    Cyble Revolutionizes Cybersecurity Collaboration With Launch of Global Partner Program ‘Cyble Partner Network’

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    2023 Cyber Strategy

    US Department of Defense 2023 Cyber Strategy Reflects Lessons from Russia-Ukraine Conflict

    Save the Children cyber attack

    BianLian Targets Charity Organization Save the Children, Triggers Angry Reactions Online

    Freecycle Data Breach

    Freecycle Data Breach: 7 Million Users at Risk, Company Urges Immediate Password Reset

    Airbus Cyber Attack

    Airbus Cyber Attack: Work of ‘USDoD’ Hacker, Linked to Turkish Airlines Employee Account Hack

    Least Preferred Cybersecurity Certifications

    The Least Preferred Cybersecurity Certifications: Market Trends Analysis by The Cyber Express

    most preferred cybersecurity certifications, Market Trends Analysis by The Cyber Express

    The Cyber Express Market Trends Survey Reveals Top 5 Cybersecurity Certifications in 2023

    ICTA Cyber Attack

    ICTA Cyber Attack: Loss of 5000 Email IDs Attributed to Lack of Backups, Administrative Issues

    COVESA data breach

    Largest Ford Dealership in Spain COVESA Hit by Data Breach, 8BASE Claims Attack

    Pathlegal cyber attack

    Cyber Clash Between Indian and Indonesian Hackers Escalates, PathLegal Becomes Latest Victim

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Mandatory Dark Web Monitoring for Indian Companies: SEBI Bolsters Cybersecurity Measures

    Tesla Data Leak

    Massive Tesla Data Leak Exposing Over 75000 Staff Attributed to Former Employees

    Cybersecurity Primer

    Bridging the Gap: Cybersecurity Primer to Address Woes Surrounding US Government Officials

    Executive order for cybersecurity

    White House Directs Federal Agencies to Enhance Cybersecurity Amid Exposure Concerns

    AI Cyber Challenge

    Biden-Harris Administration Introduces AI Cyber Challenge, Offering $20 Million Reward

    aws agent hijack

    New Research Exposes Advanced Cyber Threat – Attackers Hijack AWS Agent to Control Endpoints

    HUB cyber security

    Investors Sue HUB Cyber Security for Misleading Statements on Mount Rainier Merger

    National Cyber Workforce and Education Strategy

    Everything You Need to Know About the National Cyber Workforce and Education Strategy (NCWES)

    Montclair cyber attack

    Montclair Cyber Attack Kicks Up the Ransom Payment Dilemma

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    Cyble Partner Network

    Cyble Revolutionizes Cybersecurity Collaboration With Launch of Global Partner Program ‘Cyble Partner Network’

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Tracking, Hacking and Attacking: The Game of Drones of Hovering Cybersecurity Risks

Amidst the rising accessibility, affordability, and popularity of drones, the drone industry faces critical challenges in the form of regulations and privacy concerns.

Avantika Chopra by Avantika Chopra
July 23, 2023 - Updated on August 17, 2023
in Firewall Daily, Research
0
Game of Drones
618
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

How easy is it to buy a drone? As simple as swiping your card or putting in your details to make that purchase. Ta-da, you are now a proud owner of a drone.

However, drones pose several risks that the makers may not have anticipated. Or maybe it was!

You might also like

Record Surge in UK Ransomware Attacks: Economic, Educational, and Regulatory Insights

Uncovering a New GitHub Vulnerability: Guarding Against RepoJacking Attacks

MGM Resorts Cybersecurity Breach: Was a 10-Minute Chat All It Took?

In recent years, drones have been considered an alternative for various purposes across industries, including using unmanned aircraft in disaster relief, rescue operations, media, military, and logistics.

So, yes… in the near future, you may have a flying vehicle delivering your Amazon package. So, what’s the downside, you may ask… That’s where things get dark.

Anyone can buy a drone. This means anyone, including criminals, can exploit the very technology created for the benefit of humankind.

But that isn’t something new, right? For years, technology has been abused by law-breakers and wrongdoers who know how to manipulate it for their own benefit.

Just like a sly malware, unmanned aerial vehicles (UAVs), in the hands of a miscreant, have the ability to breach privacy without detection. Drones can discreetly gather data and capture images without attracting undue attention.

You may not even be aware of a drone flying over your backyard, mapping and scanning the very area you feel secure in. However, privacy is not the only concern.

In recent years, hackers have played around with the technology to orchestrate attacks, indicating how severe the situation could be.

In October 2022, hackers were able to target and compromise the systems of a US financial services company using DJI drones.

By safely landing the drones on the company’s roof, the cybercriminals deployed the modified Wi-Fi Pineapple devices to capture network credentials. By using stolen credentials, the hackers could access the internal networks and steal sensitive data. The attack reportedly significantly impacted the company’s operations.

While the company’s name was never disclosed, security researcher Greg Linares detailed how the hackers could conduct the security breach using drones in a series of tweets.

“An east coast company specializing in private investments detected unusual activity on their internal confluence page originating on their own network. During the incident response, they discovered that the user whose MAC address was used to gain partial access to their WIFI was also logged in from their home several miles away. The team deployed embedded WIFI signal tracing and a Fluke system to identify the WIFI device,” the post began.

“This led the team to the roof, where a ‘modified DJI Matrice 600’ and a ‘modified DJI Phantom’ series were discovered. The Phantom was carrying a ‘modified Wifi Pineapple Device’,” the tweet continued.

Linares further explained that the Matrice was found to be carrying a case containing Raspberry Pi, several batteries, a GPD mini laptop, a 4G modem, and another Wi-Fi device.

Moreover, the DJI Phantom drone had originally been used a few days prior to intercept a worker’s credentials and WIFI. This data was then hard-coded into the tools that were deployed with the Matrice.

“These tools were used to directly target the internal confluence page in order to target other internal devices from credentials stored there,” Linares stated.

In an interview with The Register, Linares noted that drone technology had come a long way. “This paired with drone payload options getting smaller and more capable – e.g., Flipper Zero kit – … make viable attack packages that are reasonable to deploy,” Linares said.

In his post, Linares called this incident to be the third “real-world drone-based attack” he encountered in the past two years.

And there are more to come.

If cybercrime were to be measured as a country, then it would be the world’s third-largest economy after the U.S. and China, noted a report by Cybersecurity Ventures published in October 2022.

The global cybercrime damage cost is predicted to grow by 15% per year over the next three years, reaching $10.5 trillion USD annually by 2025, up from $3 trillion USD in 2015, the report stated.

Simultaneously, the drone industry has experienced a significant surge in growth.

According to the latest report by Fortune Business Insights, the global commercial drone market growth was valued at $8.77 billion in 2022 and is projected to grow from $10.98 billion in 2023 to $54.81 billion by 2030.

The report highlights how drone services are displacing traditional legacy services in the commercial sector.

Many renowned organizations are investing in designing and developing lightweight commercial drones tailored for a wide range of applications. These include medical emergency transportation, inspection and maintenance, filming and photography, mapping, surveying, and surveillance, among others.

Moreover, with the integration of AI-powered technology, drones now possess advanced computer vision systems, including cameras and sensors, that can accurately understand and interpret the environment.

Interestingly, a surge has also been noted in the number of registered drones with the Federal Aviation Authority (FAA) for commercial use.

According to a Cybernews report, FAA-registered drones exceeded nearly 1 million compared to the United States, which issued approximately 300,000 commercial pilot licenses in 2022.

It is essential to note that these figures exclude drones operated by amateur pilots or hobbyists who don’t require professional licenses, highlighting how vast the current drone landscape is.

Additionally, drones operating below weight limitations (typically under 250 grams) may not require licensing or registration, although registration with local or federal authorities may still be necessary.

As drones continue to increase in accessibility, affordability, and popularity, it is crucial to recognize that regulations and privacy concerns persist as significant challenges for the drone industry.

How easily can a drone be hacked?

There is no denying the fact that drones, like all electronic devices, can be hacked. However, the question is… How easily can a drone be compromised? As the scope of drone-related security issues extends far beyond privacy.

A recent report by Kaspersky revealed that gaining unauthorized access to a drone through hacking is not necessarily a technically challenging task, as numerous drone operators inadvertently leave their drones vulnerable to attacks.

Another report stated that drones can be “hacked easily” due to their reliance on wireless communication between the remote control and the aircraft.

Moreover, threat actors employ multiple approaches when attempting to hack drones. These approaches encompass various techniques, strategies, and methodologies that are specifically designed to exploit vulnerabilities and weaknesses in drone systems.

What’s concerning is that these hackers may not even need to possess their own drones. Instead, they can leverage various exploitative methods to compromise and gain control over drones, manipulating them for their own malicious intentions.

Types of drones

Drones can be divided into four broad categories: commercial drones, military drones, Fixed Wing Drones, and Quadcopters.

  1. Commercial Drones: Designed for commercial use, these are utilized in various industries such as aerial photography and videography, delivery services, agriculture, inspection and surveying, and more.
  2. Military Drones: Also known as unmanned combat aerial vehicles (UCAVs) or unmanned aerial systems (UAS), armed forces use these for reconnaissance, surveillance, target acquisition, and even offensive operations. These drones vary in size and capabilities and can carry out airstrikes
  3. Fixed Wing Drones: Similar to traditional airplanes, fixed Wing Drones achieve flight through forward motion and rely on the lift generated by their wings. They can fly for long durations and at higher speeds compared to other drone types. They are often used for mapping, aerial surveying.
  4. Quadcopters: These multirotor drones are characterized by having four rotors. Widely popular due to their manoeuvrability, these achieve flight and stability by adjusting the rotational speeds of these four rotors. They are commonly used in aerial photography, recreational flying, and racing events.

How can a drone be hacked?

Threat actors exploit various methods to gain access to drones. However, these may vary based on the drone model, its security features, and vulnerabilities in its system.

  1. GPS Spoofing: It is a way to confuse the drone into following false navigation instructions. This is done by either sending a strong signal (Overt spoofing) to overwhelm the legitimate GPS signal or by sending a weaker signal (covert spoofing) similar to the legitimate GPS signal.
  2. Signal Interference: In this type of attack, hackers may try to disrupt the communication link between the drone and its controller by jamming or interfering with the radio frequency signals.
  3. Malware and Firmware Exploitation: Through this, hackers can exploit vulnerabilities in the drone’s software or firmware by injecting malicious code or exploiting software weaknesses. If successful, the hacker can gain unauthorized access to the drone’s functions and control.
  4. Wi-Fi Hacking: Often, commercial drones rely on open Wi-Fi connections, leaving them vulnerable to attacks. In this, hackers may attempt to exploit weaknesses in the Wi-Fi network to gain unauthorized access to the drone’s controls or intercept the transmitted data.
  5. Physical Access: In some cases, hackers may target the physical components of the drone. By gaining physical access to the drone, they can modify its hardware, firmware or even implant malicious devices to gain control or extract sensitive information.

While flying a drone may be on your checklist, it is essential to understand how these systems can be exploited if left vulnerable. The dual classification of drones as both aircraft and networked computing devices gives them a distinctive legal position, which can be easily exploited by threat actors.

The US laws and regulations surrounding drone access and usage strive to safeguard the public, yet hackers persistently seek opportunities to exploit any loopholes. This highlights the need to understand the factors that contribute to the threat of drone-related cyberattacks and take proactive measures to mitigate them.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: commercial dronesdrone attacksdrone hackingfixed wing dronesmilitary dronesThe Cyber ExpressThe Cyber Express News
Previous Post

Anonymous Sudan’s Hacktivism: A Genuine Cause or Just a Facade?

Next Post

Inside the Mind of a Cyber Security Expert: Penetration Testing, APT Simulations, and Ransomware Tactics

Avantika Chopra

Avantika Chopra

Associate Editor, The Cyber Express

Related Posts

ransomware attacks in the uk
Firewall Daily

Record Surge in UK Ransomware Attacks: Economic, Educational, and Regulatory Insights

by Vishwa Pandagle
September 13, 2023
GitHub Vulnerability
Firewall Daily

Uncovering a New GitHub Vulnerability: Guarding Against RepoJacking Attacks

by Ashish Khaitan
September 13, 2023
MGM Resorts cyber attack
Firewall Daily

MGM Resorts Cybersecurity Breach: Was a 10-Minute Chat All It Took?

by Vishwa Pandagle
September 13, 2023
Microsoft Patch Tuesday September 2023
Firewall Daily

Microsoft Patch Tuesday September 2023 Addresses 59 Vulnerabilities, Actively Exploited Zero-Days

by Ashish Khaitan
September 13, 2023
2023 Cyber Strategy
Firewall Daily

US Department of Defense 2023 Cyber Strategy Reflects Lessons from Russia-Ukraine Conflict

by Vishwa Pandagle
September 13, 2023
Next Post
Inside the Mind of a Cyber Security Expert

Inside the Mind of a Cyber Security Expert: Penetration Testing, APT Simulations, and Ransomware Tactics

Latest Issue is Out. Subscribe Now



Follow Us On Google News

Latest Cyber News

2023 Cyber Strategy
Firewall Daily

US Department of Defense 2023 Cyber Strategy Reflects Lessons from Russia-Ukraine Conflict

September 13, 2023
Save the Children cyber attack
Firewall Daily

BianLian Targets Charity Organization Save the Children, Triggers Angry Reactions Online

September 12, 2023
Freecycle Data Breach
Data Breach News

Freecycle Data Breach: 7 Million Users at Risk, Company Urges Immediate Password Reset

September 12, 2023
Airbus Cyber Attack
Data Breach News

Airbus Cyber Attack: Work of ‘USDoD’ Hacker, Linked to Turkish Airlines Employee Account Hack

September 12, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance