Categories: Breaking NewsHacking

Hacking Military Drones Info Can Be Found on Google

You can find a manual on how to hack drones online, simply searching on Google. This can lead to severe problems and negative consequences.

Drones have become truly popular, due to the multiple benefits that they offer. In the military, drones have been in use thanks to their versatility, their low cost and of course the prevention of casualties among soldiers. However, besides their advantages the drones have to deal with several downsides. One major downside is the fact that they can be spotted and hacked by the experts. Imagine the consequences of having your military weapon compromised and acting against you at war.

According to Esti Peshin, Israel Aerospace Industries cyber-programs director, anyone can simply gather information related to the hacking of drones online with the use of Google.

While speaking at a Conference for Defensive Cyberspace Operations and Intelligence in the United States (Washington), she expressed her concerns over the ease of acquiring such threatening details to be used for illegal activities.

“It’s a PDF file… essentially, a blueprint for hackers,” she commented on the nature of the material, while she added that: “You can Google, just look up ‘Tippenhauer’ – it’s the first result in Google. Look up ‘UAV cyberattacks’ – it’s the third one. ‘UAV GPS spoofing attacks’ – the first one,”.

When it comes to cybersecurity measures and alertness of the proper departments that should protect every one from hackers, she was pessimistic and disappointed:

“The fact is that we are slower than the bad guys and the bad guys could take this article and render it into a form of an attack. One of the things that keep me up at night is cybersecurity for operational networks, military systems, weapons systems.”

It is important to point out the fact that there might be some relation between the hacking of drones made easily accessible on Google and the downing of a CIA drone caused by Iran. GPS hijacking has become a growing phenomenon that will most likely grow even further in the near future, as drones take over more responsibilities and are used in multiple situations. The estimated cost for getting what it takes to hack the drones varies from $2,000 to $3,000 and this is certainly an investment that hackers can spare.

The most alarming problem with drones has to do with the obsolete technology used in their function. This is why it has been easy for the pros to penetrate their protection, as it seems. If we take into consideration the fact that more people nowadays have been using drones, we can easily comprehend that there is great risk in the field of security. Now that the hackers have been able to gain unauthorized access to the way drones work, there is nothing stopping them from doing just that and acting to their best interest.

As it turns out, there are cases when a drone can cause severe problems. For instance, a drone might distract a plane or additional weapons can be added on it and cause damages. However, the manufacturers of drones have their own claims and suggest that any misuse should not be regarded as a faulty machine or an item that we are better off without. It is certainly a matter of controversy and will cause powerful debates of ambiguity over time.

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at Security Gladiators, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

(Security Affairs –  Drone hacking, military)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

13 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

14 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

19 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

1 day ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.