Maldrone: A security researcher created a backdoor specifically for drones Appliances, which can silently interact with the drone's drivers and sensors, allowing any attacker to take full control of it.
Successful efforts to achieve these results have been recorded in the past, with Samy Kamkar's project, SkyJack, being one of the most remarkable.
Security researcher Rahul Sasi created a Backdoor under the name Maldrone which can be planted in a flying device and allows interaction with the navigation board, through serial ports used to communicate with the propellers and LEDs, the motor driver, as well as the accelerometer, gyroscope, and sonar sensors.
This is done by violating the software application controlling the device (program.elf), making it communicate directly through the proxy serial ports set up by the attacker.
Infection is achieved by redirecting the legitimate communication channel to fake ports.
Sasi explains in a blog post that Maldrone can intercept and modify data about the flight ενός drone και είναι ανθεκτικό έναντι στην επαναφορά της λειτουργίας του drone στις εργοστασιακές του settings.
Aναφέρει επίσης ότι η κερκόπορτα έχει αναπτυχθεί για drones που βασίζονται σε επεξεργαστές ARM με λειτουργικό system Linux, but he only experimented with the Parrot Ar Drone 2.0 and DJI Phantom.
Watch the security researcher's demo in the following video:
Author information
Nat BotPak
Always stays on track!