Security

A drone was modified to disrupt U.S. Power Grid, says intelligence bulletin

US officials believe that a drone was employed in an attempted attack on a power substation in Pennsylvania last year.

US officials believe threat actors used a drone in an attempted attack on a power substation in Pennsylvania last year.

The attackers used a DJI Mavic 2 quadcopter-type drone, with a thick copper wire attached underneath it via nylon cords. According to a federal law enforcement bulletin obtained by ABC News and CNN, the small UAV crashed near a Pennsylvania power substation and was used to damage the power grid. Federal officials issued the bulletin to raise awareness about the threat of drones to critical infrastructure

“The July 2020 incident is the first known case of a “modified unmanned aircraft system likely being used in the United States to specifically target energy infrastructure,” states the October 28 memo from the FBI, Department of Homeland Security and the National Counterterrorism Center. That statement is based on a review of drone incidents dating back to 2017.” reported ABC7 News.

The drone was modified to create a “short circuit to cause damage to transformers or distribution lines, based on the design and recovery location.” The drone “appeared to be heavily worn, indicating it was flown previously and was modified for this single flight.”

The good news is that the drone crashed on a rooftop near the unidentified substation, for this reason it did not damage the electricity supply or equipment.

TheDrive website revealed the location of the crash with the support of a reader.

“A reader has been able to identify the location of the electrical substation and where the drone was recovered based on the partial map from JIB. The substation and adjacent building are across the way from the Hershey Company’s old chocolate factory in Hershey, Pennsylvania. This is also relatively close to the Hersheypark amusement park.” reads TheDrive website.

Source: ABC7 website

The memo did not attribute the attack to a specific threat actor.

As drones have become cheap and easy to command, they could represent a serious threat in the hands of attackers that could use them to target critical infrastructure.

“[W]e expect illicit [unmanned aircraft system] activity to increase over the energy sector and other critical infrastructure facilities as use of these systems in the United States continues to expand,” concludes the intelligence bulletin.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, drone)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

4 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

17 hours ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

1 day ago

Researchers released exploit code for actively exploited Palo Alto PAN-OS bug

Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks'…

1 day ago

Cisco warns of large-scale brute-force attacks against VPN and SSH services

Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services,…

1 day ago

This website uses cookies.