Maldrone: Backdoor allows full control of drones

Maldrone: A security researcher created a backdoor () specifically for drone devices, which can silently interact with the drivers and sensors carried by the respective drone, allowing any attacker to take full control of it.

Successful efforts to achieve these results have been recorded in the past, with Samy Kamkar's project, SkyJack, being one of the most remarkable.

maldrone

Security researcher Rahul Sasi created a Backdoor under the name Maldrone which can be planted on a flying device and allows interaction with it board, through serial ports used to communicate with the propellers and LEDs, the motor driver, as well as the accelerometer, gyroscope, and sonar sensors.

This is done by violating the software application controlling the device (program.elf), making it communicate directly through the proxy serial ports set up by the attacker.

Infection is achieved by redirecting the legitimate communication channel to fake ports.

Sasi explains in a blog post that Maldrone can block and modify the data on a drone's flight and is resilient to reverting drone to its factory settings.

He also reports that the backdoor has been developed for ARM-based Linux-based drones, but he only experimented with the 2.0 and DJI .

Watch the security researcher's demo in the following video:

 

Author information

Nat BotPak

Nat BotPak

Always stays on track!

SecNews.gr

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).