• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
alert: new electromagnetic attacks on drones could let attackers take

Alert: New Electromagnetic Attacks on Drones Could Let Attackers Take Control

You are here: Home / General Cyber Security News / Alert: New Electromagnetic Attacks on Drones Could Let Attackers Take Control
June 28, 2023

Drones that really don’t have any recognised security weaknesses could be the target of electromagnetic fault injection (EMFI) attacks, most likely enabling a risk actor to attain arbitrary code execution and compromise their operation and security.

The research arrives from IOActive, which observed that it is “possible to compromise the targeted system by injecting a distinct EM glitch at the correct time throughout a firmware update.”

“This would permit an attacker to gain code execution on the key processor, attaining access to the Android OS that implements the core functionality of the drone,” Gabriel Gonzalez, director of components security at the organization, reported in a report released this thirty day period.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The review, which was carried out to ascertain the recent security posture of Unmanned Aerial Vehicles (UAVs), was carried out on Mavic Pro, a preferred quadcopter drone made by DJI that employs different security characteristics like signed and encrypted firmware, Reliable Execution Natural environment (TEE), and Secure Boot.

Cybersecurity

Side-channel attacks ordinarily work by indirectly accumulating data about a concentrate on process by exploiting unintended information and facts leakages arising from variants in power intake, electromagnetic emanations, and the time it requires to carry out distinct mathematical operations.

EMFI aims to induce a hardware disruption by putting a steel coil in shut physical proximity to the Android-primarily based Control CPU of the drone, eventually resulting in memory corruption, which could then be exploited to achieve code execution.

“This could allow an attacker to totally control one gadget, leak all of its delicate articles, help ADB access, and possibly leak the encryption keys,” Gonzalez reported.

As for mitigations, it really is encouraged that drone builders include hardware- and software program-based EMFI countermeasures.

Cybersecurity

This is not the to start with time IOActive has highlighted uncommon attack vectors that could be weaponized to concentrate on units. In June 2020, the corporation detailed a novel approach that tends to make it achievable to attack industrial control units (ICS) utilizing barcode scanners.

Other assessments have illustrated security misconfigurations in the Extensive Selection Large Space Network (LoRaWAN) protocol that make it inclined to hacking and cyber attacks as nicely as vulnerabilities in the Ability Line Communications (PLC) element utilized in tractor trailers.

Identified this short article intriguing? Follow us on Twitter  and LinkedIn to read much more unique content material we submit.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «cryptoslabs scam ring targets french speaking investors, rakes in €480 million CryptosLabs Scam Ring Targets French-Speaking Investors, Rakes in €480 Million
Next Post: Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data newly uncovered thirdeye windows based malware steals sensitive data»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.