Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which would result in gaining complete access to the firmware and core functionality of the drone.
Drones have been used in many industries like aviation, agriculture, and law enforcement. They are often operated remotely, which offers an attack surface for threat actors to gain control over them.
Stealing a drone can offer much more sensitive information for an attacker and can also pave the way for implanting malware on the system.
According to the report, it is possible to exploit a drone by injecting a specific Electromagnetic glitch during a firmware update that could result in complete control over the drone.
DJI drones are considered for testing purposes as they offer many security features in their products like Encrypted firmware, Trusted Execution Environment (TEE), Secure Boot, etc.
Furthermore, the whitepaper published by IOActive also covered Attack Surface, Technical Background, First and Second Approaches, and their Mitigations.
There are multiple attack surfaces for a drone in a wireless network. Like any other system with a backend, drones are also made up of servers vulnerable to SQL injections, SSRF, and many other backend-based attacks.
Today’s drones are controlled by mobile applications mostly, which can be a great attack surface for threat actors.
The vulnerabilities include operating system and application-based vulnerabilities.
RF-based attacks like interference, jamming, spoofing, and other attacks are also possible on these UAVs.
DJI drones also have OcuSync, a protocol for low latency between the controller and the drone.
OcuSync protocol can automatically switch between multiple communication channels to have stable and strong connectivity.
It can also be used in environments where large radio interference is present.
Physical access to a drone can give a wide range of information to threat actors like firmware and other sensitive information.
The whitepaper mentioned that the technical information for this attack vector relied on three main types of side-channel attacks,
This attack relies on targeting the time taken for the completion of an operation which can be used for other attacks like breaking cryptographic implementation and guessing PIN numbers.
The voltage path for the chip is tracked and monitored for Simple Power Analysis for a targeted operation. Later, this can be used to recover secrets like cryptographic keys.
An EM probe can retrieve power-based information, which can be less invasive. However, it must be kept very near to the drone chip.
The drones are susceptible to an EMFI, which can disrupt the hardware while processing some operations due to the EM probe attack.
This can change a lot of behavior of the CPU of the drones resulting in a gain complete takeover of the drone.
IOActive has published a complete attack report and mitigation steps.
Stop Advanced Email Threats That Target Your Business Email – Try AI-Powered Email Security
Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a…
Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version…
A significant post-authentication vulnerability affecting Four-Faith industrial routers has been actively exploited in the wild.…
Cyberhaven, a prominent cybersecurity company, disclosed that its Chrome extension With 400,000+ users was targeted…
AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were targeted…
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…