ALVARO'S CYBER SECURITY COLUMN - DRONES
Written on 16/09/2022

Cybercriminals use drones to steal information by hacking the device through various methods.  Is there anything cybercriminals can't use to break into the devices of businesses and individuals? Well, it would suffice to say a non-electronic object, but just the opposite abounds in our lives. We are making more and more use of electronic devices, both for work and for leisure; in many cases, those devices are common.  One of them, which has gained a lot of fame in recent years among children and adults, is the DRONE. Drones have become a work tool thanks to their capabilities, which have drawn the attention of a very dangerous sector, that of cybercriminals. They have become a weapon that they now use to carry out cyber attacks. Drones are another option that cybercriminals use to steal information.


Now, what are they capable of doing? Depending on the level of the cybercriminal, cyberattacks can be carried out on companies or institutions, although they are not the only ones. They can also be used to cyberattack ordinary users, specifically to get hold of their data or money, among other options. As if this were not enough, peripherals can be added to these devices to improve their specifications: thermal sensors, microphones or cameras in the case of not come as standard. Cybercriminals, knowing their vulnerabilities, easily hack them and publish how to do it on the networks. Although there are indeed several methods to achieve this, the four most used are Cyber Take-Over, by inhibiting its radio frequency, GPS spoofing and through SkyJack technology, which uses hardware (a Raspberry Pi) and specific software. All of them are easily accessible and achieve satisfactory results.

We will briefly explain what each method consists of. We start with Cyber Take-Over, which is using a packet analyzer to hack the communication signal between the drone and the operator. As it is not encrypted, it is done in a very simple way and allows you to take full control of the device and the system. The second method, inhibition of its radio frequency, consists of altering the communication between the drone and its operator so that the devices lose the video, telemetry or even GPS signal. About the GPS spoofing method, say that software is used to supplant the drone's GPS signal and thus send it to false coordinates and thus take control.

The fourth method, SkyJack, which allows hacking multiple drones with a single drone, is to use a Raspberry Pi and the "SkyJack" app to listen to and monitor other types of drones and thus hack them. As you can see, there are several options and all of them are perfectly valid to gain control of the drone or to use your own for illegal activities. Drone hacking is yet another proof of the capabilities of cybercriminals to take advantage of any electronic device. Perhaps this will serve, in the not-too-distant future, so that drones have better security measures. It is a very widespread object, which can be accessed even by children.

DOUBLE VERIFICATION - MANDATORY
From 1st October 2022 - 2 Factor Authentication (2FA) will be mandatory for all BAT users to be compliant with our high security standards

Alvaro Gonzalez Cyber security expert for BAT 




All news