September 7, 2023 By Mike Elgan 3 min read

Cybersecurity staff at an East Coast financial services company last summer detected unusual activity on its internal Atlassian Confluence page originating inside the company’s network. The MAC address used locally belonged to an employee known to be currently using the same MAC address remotely, according to a security specialist named Greg Linares, who had secondhand information about the attack.

So, the team used a Fluke AirCheck Wi-Fi Tester device to identify the device logged in, which led the team to the roof of the building. And what they found there surprised everybody: Two drones.

One drone was a DJI Phantom with an attached Wi-Fi Pineapple device, commonly used for penetration testing but misused in this case to hijack an internet connection (The device spoofed the legitimate network, and when employees tried to log in to the fake network, they revealed their login credentials). The second drone was a DJI Matrice drone with a connected Raspberry Pi, a tiny GPD laptop, a modem, a Wi-Fi device and some batteries.

(A later investigation revealed that the Phantom drone had been used days before to capture the worker’s credentials undetected.)

Fast action by the security team thwarted a more damaging attack. But the perpetrators were never caught.

How drones can enable cyberattacks

Using drones in cyberattacks was theorized long before real attacks happened. For example, nearly a decade ago, security researcher Samy Kamkar created a drone rig that he called SkyJack, which was designed to use custom software on an attached Raspberry Pi to take control of other drones in flight autonomously.

Other tech researchers demonstrated conceptual hacks over the years. But after last year’s hack described above, drone hacking has gotten very real in the war between Russia and Ukraine. That war is considered the first full-scale “hybrid war,” combining military with cyber warfare. And drones play a role in that conflict in the gathering of intelligence, the bypassing of physical security, jamming communications (and drone signals themselves) and the delivery of malware.

In general, drones are useful to cyber attackers because they can perform a range of high-flying functions:

Physical surveillance: Drones equipped with high-quality cameras can be used to observe shift changes, gather information on security protocols and plan physical attacks.

Network sniffing and spoofing: Hackers can equip drones with small, modifiable computers (like a Raspberry Pi) to sniff out information about a Wi-Fi network, such as the MAC addresses and SSID. The drone can then mimic a known Wi-Fi network. If unwitting employees connect to this fake network, hackers can access sensitive information. This approach can be used to bypass security protocols and gain direct access to a network.

Denial-of-Service attacks: Drones can carry devices to perform local de-authentication attacks, a type of Denial-of-Service (DoS) attack that targets communication between a user and a Wi-Fi wireless access point. They can also carry devices to jam Wi-Fi or other communications.

Why the risk grows every year

While Ukrainian ingenuity is pioneering tactics for using consumer drones for cyberattacks, the drone industry itself is rapidly improving drones in ways that make them better suited to that purpose.

Drones are evolving quickly to become quieter and faster, fly further from their operators, fly around all obstacles, track moving objects and take much higher-resolution pictures and videos.

To pick one random, specific example, a cyber attacker could sit in the corner of an office parking lot to track an employee. Using an under-$700 DJI Mini 3 Pro (too light to require registration and folds up to fit into a pocket), the hacker could select the employee’s car and press a single on-screen button to lock on. As the employee drives away, the drone automatically follows and tracks the employee’s car while shooting 4k video as far away as seven miles. Once the employee arrives home, the drone could land on the roof and begin hacking the home network used by the employee’s home office. From there, the attack possibilities are obvious.

Five years ago, this set of capabilities would have cost thousands of dollars. Ten years ago, they would have been impossible.

Consumer drones are evolving quickly to become increasingly valuable to cyber attackers.

How to protect against consumer drone-enabled attacks

As drone-powered cyberattacks transition from theoretical to practical to (in the future) widespread, the time is now to safeguard against this emerging threat. Here’s how:

  • Inspect physical security with drones in mind. Evaluate physical spaces accessible by drones where networks and visual data are exposed.
  • Deploy network segmentation and intrusion detection.
  • Consider wired network connections instead of wireless, where drones could hover or land.
  • Include drone-enabled attacks in penetration testing to discover vulnerabilities.
  • Use privacy screens on user systems where sensitive or credential data might be displayed.
  • Place motion-detection cameras on rooftops to alert about drones if they land.
  • Embrace security standards and controls and best practices like zero trust security architectures.

While solid security practices, tools and services are the best protection, it’s really time to re-think physical security and consider all the many ways drones can defeat it.

More from Risk Management

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today