+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

There's now a way to hijack nearly any drone mid-flight using a tiny gadget

Oct 27, 2016, 15:15 IST

Advertisement
A micro-drone being controlled via a hijacker with the Icarus device.Dan Goodin/YouTube

A researcher has developed a gadget that is capable of hijacking most drones mid-flight - locking the owner out and giving the attacker complete control over the device.

Jonathan Andersson, a manager at Trend Micro's TippingPoint DVLab, showed off his findings at the PacSec Security conference on Wednesday, and talked to Ars Technica and The Register about his work.

Andersson calls his gadget Icarus, and it isn't available to buy - but it's theoretically replicable by others. It has some pretty obvious benefits to law enforcement, and people trying to protect their property. Pesky drone flying around? Just hijack it and land it safely. But on the flipside, it could also be used for more nefarious purposes.

Advertisement

Cris Toala Olivares/Reuters

There are already jamming devices out there that block controlling radio signals, rendering a drone useless. But they don't give the attacker control like Icarus does. It works by exploiting DMSx, the radio signal protocol that most remote-controlled consumer drones on the market use - letting the hijacker take the reins.

"The shared secret ('secret' used loosely as it is not encrypted) exchanged is easily reconstructed long after the binding process is complete by observing the protocol and using a couple of brute-force techniques," Andersson told Ars Technica. "Further, there is a timing attack vulnerability wherein I synchronize to the target radio's transmissions and transmit a malicious control packet ahead of the target, and the receiver accepts my control information and rejects the targets."

Concerningly, it's not clear whether this is an issue that could ever be fixed or patched. "My guess is that it will not be easy to completely remedy the situation ... The manufacturers and partners in the ecosystem sell standalone radio transmitters, models of all kinds, [and] transmitters that come with models and standalone receivers. Only a certain set of standalone transmitters have a firmware upgrade capability, though the fix is needed on the model/receiver side."

And DSMx isn't just used in drones - meaning other radio-controlled products will also be vulnerable. "It works against all DSMx based radio systems, which would include drones, airplanes, cars, boats, and so on," the researcher told The Register.

Here's a video of Icarus in action:

Read more:

NOW WATCH: This Lego-style home can be built in a few weeks with just a screwdriver

Please enable Javascript to watch this video
You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article