• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  The cybersecurity threats drones face and how to mitigate them
Consequences-of-cyberattacks-on-drones
07 November 2019

The cybersecurity threats drones face and how to mitigate them

Written by Seqrite
Seqrite
Cybersecurity
Estimated reading time: 3 minutes

The global drone market is expected to rise to $43 billion in 2024, a huge rise from $14 billion in 2018. It is an indicator of the huge popularity surge in drones, technically known as unmanned aerial vehicles (UAVs). Used mainly by the military in the last decade, the current decade has seen full-scale commercial use of these machines all over the globe. Drones are becoming so affordable that they are available for anyone to buy on the internet and customize according to size and shape.

While companies like Amazon, Domino’s and UPS are seriously exploring using drones for various delivery-related purposes, security researchers have highlighted the importance of cybersecurity in drones. Like any other device, drones too are susceptible to cyberattacks and considering their use for many different purposes, the consequences could be severe. In 2009, insurgents in Iran intercepted live video feeds from a US drone using software available on the Internet. In 2011, an American UAV was captured by Iranian forces who jammed its control signals and implemented a GPS spoofing attack.

According to the US Department of Homeland Security, “Unmanned aircraft systems (UASs) provide malicious actors, an additional method of gaining undetected proximity to networks and equipment within critical infrastructure sectors. Malicious actors could use this increased proximity to exploit unsecured wireless systems and exfiltrate information”.

A few ways in which drones pose cybersecurity risks are:

Loss of critical information

Autonomous vehicles can be used by malicious actors, such as terrorists or insurgents, to gain access to key information, such as military complexes or power plants. These malicious actors can position themselves at a safe distance and fly drones over these installations, garnering information to be used for malicious purposes.

Using drones to exploit access points and unsecured systems

There have been instances of drones being used to wirelessly exploit access points and unsecured networks. In one experiment, security researchers flew a drone with an autonomous attack kit near an office building which sent malicious over the air updates controlling smart light bulbs inside the building. In Singapore, security researchers found a way to intercept wireless printer transmissions using smartphones attached to drones.

Removing sensitive information from secure locations

Small amounts of highly sensitive data could be stolen through specially equipped drones via visual or radio signals. In a publicized experiment, a camera fitted to a drone stole data through a computer’s blinking LED light in Israel.

Liable for exploitation

Much like satellites, many commercial drones regularly communicate with ground-based operators or networks using mainly unencrypted feeds. This opens up drones to interception by malicious attackers who may also use vulnerabilities with drone software systems to inject malware.

It is imperative for organizations using drone technology to be cognizant of the cybersecurity risks that surround them and take the required action to circumvent those threats.

A few ways in which these threats can be mitigated are:

Geofencing

While malicious actors could theoretically remove geofencing limitations, it is still necessary to implement geofencing solutions within secure areas. Through geofencing, a virtual border is created around a specific area through a GPS or RFID-enabled software.

Awareness of local regulations concerning drone use

Regulations around drone use are changing every day in different jurisdictions. This is being done to negate the threat of unauthorized drones being used by malicious actors for non-ethical purposes. It is important to be aware of the regulations around drone use in specific locations.

Timely patching

As observed in the examples above, drones can take advantage of vulnerabilities and backdoors within systems and inject malware. Hence, it is important to plug these vulnerabilities as soon as possible to ensure smooth functioning.

In the next decade, drones may become a norm in day-to-day life just how cellphones are a norm today which they were not only a few years ago. Cyber criminals are already aware of this and are finding new ways to use drone technology to create chaos. Organizations must also be cognizant of the risks and take necessary measures to secure this valuable technology.

 Previous PostDealing with cybersecurity threats in the age of autonomous vehic...
Next Post  The importance of cybersecurity for satellite communications
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Turn the Page Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Building a holistic cybersecurity strategy to safeguard the pharma sector

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021
  • Data breach volumes worry governments and businesses

    The Data breach inferno burning big-ticket businesses

    February 5, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.