Drone Cockpits Compromised

A computer virus has infected the cockpits of America’s Predator and
Reaper drones, logging pilots’ every keystroke as they remotely fly
missions over Afghanistan and other warzones.

Not sure what the exact attack vector is.  I have a feeling that the pilots aren’t surfing the web while flying but then again it’s certainly possible.  Stuxnet, has totally changed the malware attack vectors.

An internet connection is no longer required to be vulnerable.  Most disturbing is the fact they’ve tried to remove it numerous times and it keeps coming back.

Be careful out there, the web not getting any less hostile.

Bookmark the permalink.

About TMM

TMM is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. Many know his private name and information however due to the current political climate, many are distancing themselves due to the abandonment of Due Process.

2 Responses to Drone Cockpits Compromised

  1. Jake says:

    I seem to recall hearing something a couple of years ago about how the drone transmissions weren’t adequately secured (though I could be wrong). Could someone be injecting a virus into the system from the drone end?

    • Nope, you’re right.  For thirty bucks you can snap the video feedback from the drone.  Control signals are encrypted and authenticated though.

      The drones themselves currently aren’t compromised, just something within the control center.  Most disturbing part about this was they made it public, which now lets people know there IS a vector into the control center.  At which point hopping to the drone is much more simple.