Maldrone: A security researcher created a backdoor specifically for drones Appliances, which can silently interact with them drivers and the sensors carried by each drone, allowing any attacker to take full control of it.
Successful attempts to achieve these results have been recorded again in the past, with the project by Samy Kamkar, SkyJack, being one of the most notable.
Security researcher Rahul Sasi created a Backdoor under the name Maldrone which can be planted in a flying device and allows interaction with the navigation board, through serial ports used to communicate with propellers and LEDs, the engine driver, as well as the accelerometer, gyrometer, and sonar sensors.
This is done by violating the software application controlling the device (program.elf), making it communicate directly through the proxy serial ports set up by the attacker.
Η contamination it is achieved by redirecting the legitimate communication channel to fake ports.
Sasi explains in a blog post that Maldrone can block and modify the data on a drone's flight and is resilient to reverting drone to its factory settings.
He also reports that the backdoor has been developed for ARM-based Linux-based drones, but he only experimented with the Parrot Ar Drone 2.0 and DJI Phantom.
Watch the security researcher's demo in the following video:
Author information
Nat BotPak
Always stays on track!