Categories: Breaking NewsHacking

Internal emails reveal Hacking Team is working on a weaponized spying drone

Experts who are analyzing the Hacking Team internal emails discovered that the firm is working on the development of a weaponized drone.

Security experts are continuing to dig the leaked internal emails from the Hacking Team, last revelation is related to the development of an unmanned aerial vehicle with the ability to run cyber attacks on computers and mobile devices through Wi-Fi networks.

Reading the email exchange between hacking team personnel, it is possible to verify that both Boeing and Hacking Team were working to a new model of Drone to use as attack vector. The unmanned aerial vehicle is described as a drone that have to be able to run cyber attacks on targets via WiFi, the vehicle has the ability to inject spyware into target systems in order to spy on victims.

According to the internal emails, after attending the International Defense Exposition and Conference (IDEX) in Abu Dhabi in February 2015, the company Insitu expressed its interest in the weaponized drones which was able to serve the spyware developed by the Hacking Team, the Remote Control SystemGalileo, for surveillance purpose.

Insitu already produces the surveillance drones ScanEagle and RQ-21A “Blackjack”, it is likely the company is thinking to develop a new weaponized drone.

Once of the mails send by Giuseppe Venneri, an Insitu employee, to Hacking Team’s key account manager Emad Shehata in April 2015 states:

“We see potential in integrating your Wi-Fi hacking capability into an airborne system [drone] and would be interested in starting a conversation with one of your engineers [Hacking Team staff] to go over, in more depth, the payload capabilities including the detailed size, weight, and power specs of your Galileo System.”

Despite the content of the email is explicit, there is no specific information in other emails on the possible buyer for the weaponized drones.

In one of the leaked emails, the co-founder Marco Valleri provided detailed information ongoing projects including roadmaps for the development activities. Among the projects, there is the “Tactical Network Injector” (TNI), a hardware device designed to inject malware into Wi-Fi networks.

A drone equipped with a Tactical Network Injector could act as a bogus access point used by hackers to launch man-in-the-middle (MITM) attacks or to serve exploits.

The principle is simple,  if the target is using a public Wifi network, the drone forces it connecting to its access point in order to run MITM attacks and inject the malicious code designed by the Hacking Team.

In the following image, I reported an excerpt of the email related to the Tactical Network Injector, the to-do list includes also the name of the resource assigned to the project, the Hacking Team employee Andrea Di Pasquale.

Di Pasquale was in charge for the development of a ruggedized component that must be transportable by a drone (mandatory), and for the creation of a micro Tactical Network Injector usable by an unmanned aerial vehicle.

The colleagues at TheHackerNews speculate on a possible interest of the US intelligence in the development of  a weaponized drone.

Just for your information, early 2014 researchers as Sensepoint security developed an application called Snoopy running on drones to steal users’ data, the software look for smartphone signal while it is searching for a WI-Fi network. The drone equipped with Snoopy software can trick mobile devices into thinking it’s a trusted access point, then the application can access data from the handset.

According the creators, Snoopy was able to steal a huge quantity of information from victims, including user’s credentials, credit card numbers a location data. Researchers at Sensepoint successfully stolen Amazon, PayPal, and Yahoo credentials from random citizens in the streets of London.

To protect user’s data it is strongly suggested to mobile device owners to turn off any automatic connection process, including WI-Fi network-finding feature.

Pierluigi Paganini

(Security Affairs – Weaponized Drones, Hacking Team)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Chinese cyber spies targeted phones used by Trump and Vance

China-linked threat actors targeted the phone communications of Donald Trump and vice presidential nominee JD Vance.…

8 hours ago

Irish Data Protection Commission fined LinkedIn €310M for GDPR infringement

Irish Data Protection Commission fined LinkedIn €310M for violating user privacy by using behavioral data…

16 hours ago

Change Healthcare data breach impacted over 100 million people

The Change Healthcare data breach in the February 2024 impacted over 100 million, the largest-ever…

1 day ago

OnePoint Patient Care data breach impacted 795916 individuals

US hospice pharmacy OnePoint Patient Care suffered a data breach that exposed the personal info…

1 day ago

From Risk Assessment to Action: Improving Your DLP Response

DLP is key in cybersecurity; a risk assessment identifies data risks, helping turn findings into…

2 days ago

U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco ASA and FTD, and RoundCube Webmail bugs…

2 days ago

This website uses cookies.