MalDrone – First Ever Backdoor Malware for Drones

The use of small Unmanned Aerial Vehicles (UAVs) called Drones is rapidly transforming the way we go to war. Drones were once used for land surveillance, Delivering Pizza’s, then equipped with bombs that changed the way nations conduct war and last year, these hovering drones were also used to hack Smartphones.

Recently, a security researcher has found a backdoor in the Parrot AR Drones manufactured by a French-based company, that could allow a malicious hacker to remotely hijacked the radio controlled flying quadcopter helicopter.

The Parrot AR Drone, revealed at the International CES 2010 in Las Vegas, is a quadricopter helicopter which you can control with your smartphone or tablet. It features two built-in cameras, is easy to fly, and can be controlled without too much danger of it flipping over or smashing into things.

FIRST EVER MALWARE FOR DRONES
Security researcher, Rahul Sasi claimed to have developed the first ever backdoor malware for AR drone ARM Linux system, dubbed

Maldrone [MALware DRONE].
Maldrone can be used to remotely hijack drones, as shown in a video demonstration below published by the hacker.
“In this we would show infecting a drone with Maldrone and expecting a reverse tcp connection from drone. Once connection is established we can interact with the software as well as drivers/sensors of drone directly. There is an existing AR drone piloting program. Our backdoors kills the autopilot and takes control. The Backdoor is persistent across resets,” video explained.

According to the researcher, Maldrone can interact with the drone’s device drivers and sensors silently and allow the hacker to control the drone remotely. As a result, Maldrone could be used to conduct remote surveillance.

Continue reading at thehackernews.com

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.