Categories: Breaking NewsHacking

Hacking Military Drones Info Can Be Found on Google

You can find a manual on how to hack drones online, simply searching on Google. This can lead to severe problems and negative consequences.

Drones have become truly popular, due to the multiple benefits that they offer. In the military, drones have been in use thanks to their versatility, their low cost and of course the prevention of casualties among soldiers. However, besides their advantages the drones have to deal with several downsides. One major downside is the fact that they can be spotted and hacked by the experts. Imagine the consequences of having your military weapon compromised and acting against you at war.

According to Esti Peshin, Israel Aerospace Industries cyber-programs director, anyone can simply gather information related to the hacking of drones online with the use of Google.

While speaking at a Conference for Defensive Cyberspace Operations and Intelligence in the United States (Washington), she expressed her concerns over the ease of acquiring such threatening details to be used for illegal activities.

“It’s a PDF file… essentially, a blueprint for hackers,” she commented on the nature of the material, while she added that: “You can Google, just look up ‘Tippenhauer’ – it’s the first result in Google. Look up ‘UAV cyberattacks’ – it’s the third one. ‘UAV GPS spoofing attacks’ – the first one,”.

When it comes to cybersecurity measures and alertness of the proper departments that should protect every one from hackers, she was pessimistic and disappointed:

“The fact is that we are slower than the bad guys and the bad guys could take this article and render it into a form of an attack. One of the things that keep me up at night is cybersecurity for operational networks, military systems, weapons systems.”

It is important to point out the fact that there might be some relation between the hacking of drones made easily accessible on Google and the downing of a CIA drone caused by Iran. GPS hijacking has become a growing phenomenon that will most likely grow even further in the near future, as drones take over more responsibilities and are used in multiple situations. The estimated cost for getting what it takes to hack the drones varies from $2,000 to $3,000 and this is certainly an investment that hackers can spare.

The most alarming problem with drones has to do with the obsolete technology used in their function. This is why it has been easy for the pros to penetrate their protection, as it seems. If we take into consideration the fact that more people nowadays have been using drones, we can easily comprehend that there is great risk in the field of security. Now that the hackers have been able to gain unauthorized access to the way drones work, there is nothing stopping them from doing just that and acting to their best interest.

As it turns out, there are cases when a drone can cause severe problems. For instance, a drone might distract a plane or additional weapons can be added on it and cause damages. However, the manufacturers of drones have their own claims and suggest that any misuse should not be regarded as a faulty machine or an item that we are better off without. It is certainly a matter of controversy and will cause powerful debates of ambiguity over time.

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at Security Gladiators, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

(Security Affairs –  Drone hacking, military)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

3 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

5 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

5 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

7 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

10 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

20 hours ago

This website uses cookies.