New Electromagnetic Attacks on Drones Could Let Attackers Take Control

0
591
New Electromagnetic Attacks on Drones Could Let Attackers Take Control


Jun 28, 2023Ravie LakshmananFirmware Security / Tech

New Electromagnetic Attacks on Drones Could Let Attackers Take Control

Drones that do not have any recognized safety weaknesses may very well be the goal of electromagnetic fault injection (EMFI) assaults, doubtlessly enabling a menace actor to attain arbitrary code execution and compromise their performance and security.

The analysis comes from IOActive, which discovered that it’s “possible to compromise the focused machine by injecting a selected EM glitch on the proper time throughout a firmware replace.”

“This would enable an attacker to achieve code execution on the primary processor, getting access to the Android OS that implements the core performance of the drone,” Gabriel Gonzalez, director of {hardware} safety on the firm, stated in a report revealed this month.

The examine, which was undertaken to find out the present safety posture of Unmanned Aerial Vehicles (UAVs), was carried out on Mavic Pro, a preferred quadcopter drone manufactured by DJI that employs varied safety features like signed and encrypted firmware, Trusted Execution Environment (TEE), and Secure Boot.

Cybersecurity

Side-channel assaults usually work by not directly gathering details about a goal system by exploiting unintended info leakages arising from variations in energy consumption, electromagnetic emanations, and the time it takes to carry out completely different mathematical operations.

EMFI goals to induce a {hardware} disruption by putting a metallic coil in shut bodily proximity to the Android-based Control CPU of the drone, finally leading to reminiscence corruption, which may then be exploited to attain code execution.

“This may enable an attacker to totally management one machine, leak all of its delicate content material, allow ADB entry, and doubtlessly leak the encryption keys,” Gonzalez stated.

As for mitigations, it is advisable that drone builders incorporate hardware- and software-based EMFI countermeasures.

Cybersecurity

This just isn’t the primary time IOActive has highlighted unusual assault vectors that may very well be weaponized to focus on methods. In June 2020, the corporate detailed a novel methodology that makes it potential to assault industrial management methods (ICS) utilizing barcode scanners.

Other assessments have illustrated safety misconfigurations within the Long Range Wide Area Network (LoRaWAN) protocol that make it vulnerable to hacking and cyber assaults in addition to vulnerabilities within the Power Line Communications (PLC) element utilized in tractor trailers.

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we put up.

LEAVE A REPLY

Please enter your comment!
Please enter your name here