Categories: IntelligenceSecurity

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial vehicle (UAV), parked at Lockheed Martin’s Skunk Works facility in Palmdale, California.

“Skunk Works” LM’s Advanced Development Program Facility is where some of the most futuristic and secret projects are developed. The image was dated 2011, Dec. 4, but it has been published only last week in a blog post by George Kaplan, an “open source” intelligence analyst.

Lockheed firm has already worked on the design of drone for reconnaissance and surveillance purposes, the dimensions calculable from the image suggest that the photographed aircraft match the one ones for wingspan of Lockheed’s secretive RQ-170 Sentinel, also a Skunk Works design.

The secret drone was sighted for the first time in Afghanistan’s Kandahar Air Field in 2007, later the Air Force confessed to use it for surveillance operations.

On December 4th, similar drone was captured by Iranian forces near the Iran-Afghanistan border. The event represented for the Iran an opportunity to make propaganda on its technological capabilities, sustaining the drone was hijacked with a sophisticated cyber attack.

Once captured the vehicle, the Iranian experts have had the opportunity to study the technological jewel, its maintenance logs indicated that it, or at least parts of it, had been sent back to Palmdale from Afghanistan for maintenance.

Obviously the photo generated great interest and many experts have expressed different opinions, some argue that it is a new project that will compete for a government supply with products developed by companies such as Boeing, Northrop Grumman and General Atomics, other analysts sustain that a new secret project could not be exposed in a parking area in this way.

The usage of drones has become increasingly common, for surveillance purposes but also to conduct attacks, it represents an indispensable military option that could preserve human lives in dangerous operations.

Drone aircrafts are able to monitor large territories, spy on and attack terrorists groups with no human intervention.  We registered several operations in which these powerful weapons have been used, In Pakistan and Yemen for example against al Qaeda exponents, and also in Somalia where President Obama secretly authorized two drone strikes and two commando raids against terrorists.

Don’t forget the massive usage in Iranian region for surveillance purpose with the intent of collect any kind of information on the evolution of Iranian nuclear program.

But the use of these deadly vehicles raises several thorny issues:

  • Devices such as UAVs are used in military reprisals conducted secretly, its legality is much debated. U.S. military has launched several lethal attacks on terrorist targets all over the world, but according specialists on government secrecy issues, the congressional oversight of these operations appears to be cursory and insufficient. The specialist  Steven Aftergood declared :

“It is Congress‘ responsibility to declare war under the Constitution, but instead it appears to have adopted a largely passive role while the executive takes the initiative in war fighting.”

  • Another sensible problem is the real security level of these vehicles. They are based on high technological components, and we know that nothing is totally secure. In internet are circulating news regarding the vulnerabilities of US drones that seems to be exploitable allowing to hackers to take control of the vehicle. Recently a team of researchers of the University of Texas at Austin, has led a successful attack accepting the challenge of the Department of Homeland Security.  The event is really dangerous, if the enemies takes control of the drone they could use it as weapon. The spoofing is not the only attacks that can hit a GPS drone, we have already spoken of GPS signal jamming. Jamming GPS signal could for example force it into an automatic landing mode the aircraft. Spoofing a GPS receiver on a UAV is possible to manipulate navigation computers providing fake information. The Professor Todd Humphreys, declared to Fox News

“In 5 or 10 years you have 30,000 drones in the airspace,”“Each one of these could be a potential missile used against us.”

  • Let’s consider that the use of drone could be extended for surveillance of territory made by law enforcement in several countries, for this reason it must be defined new rules to allow government and commercial use of UAVs. In US Congress ordered the Federal Aviation Administration to define the rules within 2015. Also private companies such has FedEx announced that they intend to use drone for their activities, with obvious impact on privacy and security.
  • Last concern about the use of drones is the real capacity of Western industry in protecting its projects and technological solutions. Foreign governments, China first, are specialized in cyber espionage and daily we read news on the violation of intellectual property. Cyber attacks, network exploit, targeted malware are all methods to steal industrial secrets on special project such as the drone’s one.

The deep knowledge of these secrets related to the technology used in the design of drones raises security concerns, on our head could fly our drones that could be used to attacks our territories … and it’s not science fiction.

Pierluigi Paganini

References

http://theaviationist.com/2012/06/15/unknown-uav/

http://theaviationist.com/2011/12/19/simple-solution/

 

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.