Categories: Breaking NewsHacking

Internal emails reveal Hacking Team is working on a weaponized spying drone

Experts who are analyzing the Hacking Team internal emails discovered that the firm is working on the development of a weaponized drone.

Security experts are continuing to dig the leaked internal emails from the Hacking Team, last revelation is related to the development of an unmanned aerial vehicle with the ability to run cyber attacks on computers and mobile devices through Wi-Fi networks.

Reading the email exchange between hacking team personnel, it is possible to verify that both Boeing and Hacking Team were working to a new model of Drone to use as attack vector. The unmanned aerial vehicle is described as a drone that have to be able to run cyber attacks on targets via WiFi, the vehicle has the ability to inject spyware into target systems in order to spy on victims.

According to the internal emails, after attending the International Defense Exposition and Conference (IDEX) in Abu Dhabi in February 2015, the company Insitu expressed its interest in the weaponized drones which was able to serve the spyware developed by the Hacking Team, the Remote Control SystemGalileo, for surveillance purpose.

Insitu already produces the surveillance drones ScanEagle and RQ-21A “Blackjack”, it is likely the company is thinking to develop a new weaponized drone.

Once of the mails send by Giuseppe Venneri, an Insitu employee, to Hacking Team’s key account manager Emad Shehata in April 2015 states:

“We see potential in integrating your Wi-Fi hacking capability into an airborne system [drone] and would be interested in starting a conversation with one of your engineers [Hacking Team staff] to go over, in more depth, the payload capabilities including the detailed size, weight, and power specs of your Galileo System.”

Despite the content of the email is explicit, there is no specific information in other emails on the possible buyer for the weaponized drones.

In one of the leaked emails, the co-founder Marco Valleri provided detailed information ongoing projects including roadmaps for the development activities. Among the projects, there is the “Tactical Network Injector” (TNI), a hardware device designed to inject malware into Wi-Fi networks.

A drone equipped with a Tactical Network Injector could act as a bogus access point used by hackers to launch man-in-the-middle (MITM) attacks or to serve exploits.

The principle is simple,  if the target is using a public Wifi network, the drone forces it connecting to its access point in order to run MITM attacks and inject the malicious code designed by the Hacking Team.

In the following image, I reported an excerpt of the email related to the Tactical Network Injector, the to-do list includes also the name of the resource assigned to the project, the Hacking Team employee Andrea Di Pasquale.

Di Pasquale was in charge for the development of a ruggedized component that must be transportable by a drone (mandatory), and for the creation of a micro Tactical Network Injector usable by an unmanned aerial vehicle.

The colleagues at TheHackerNews speculate on a possible interest of the US intelligence in the development of  a weaponized drone.

Just for your information, early 2014 researchers as Sensepoint security developed an application called Snoopy running on drones to steal users’ data, the software look for smartphone signal while it is searching for a WI-Fi network. The drone equipped with Snoopy software can trick mobile devices into thinking it’s a trusted access point, then the application can access data from the handset.

According the creators, Snoopy was able to steal a huge quantity of information from victims, including user’s credentials, credit card numbers a location data. Researchers at Sensepoint successfully stolen Amazon, PayPal, and Yahoo credentials from random citizens in the streets of London.

To protect user’s data it is strongly suggested to mobile device owners to turn off any automatic connection process, including WI-Fi network-finding feature.

Pierluigi Paganini

(Security Affairs – Weaponized Drones, Hacking Team)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CrowdStrike update epic fail crashed Windows systems worldwide

Windows machines worldwide displayed BSoD screen following a faulty update pushed out by cybersecurity firm…

5 hours ago

Cisco fixed a critical flaw in Security Email Gateway that could allow attackers to add root users

Cisco has addressed a critical vulnerability that could allow attackers to add new root users…

12 hours ago

SAPwned flaws in SAP AI core could expose customers’ data

Researchers discovered security flaws in SAP AI Core cloud-based platform that could expose customers' data. Cybersecurity researchers…

1 day ago

Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums

The cybercrime group FIN7 is advertising a security evasion tool in multiple underground forums, cybersecurity…

1 day ago

How to Protect Privacy and Build Secure AI Products

AI systems are transforming technology and driving innovation across industries. How to protect privacy and…

1 day ago

A critical flaw in Cisco SSM On-Prem allows attackers to change any user’s password

A vulnerability in Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem) license servers allows threat…

2 days ago

This website uses cookies.