When Drones Become a Cyber Weapon

In recent years, the use of drones for various tasks by different organizations around the world has increased. Security systems worldwide are preparing and defending against the majority of physical threats posed by crime and terror organizations – such as attacks, explosive devices, suicide drones, and drones used for intelligence gathering through photography, among others.
But in the modern era, the drone is not just a “flying device” – it is also a platform for sophisticated cyberattacks.

Yogev Yadin, Regional Director at Skylock, stated: “Although the threat most people associate with drones is their use as physical attack tools, we must consider that they can also be used as powerful and dangerous cyberattack tools. At the same time, the ability to identify this threat in real-time is extremely limited.”

Over the last decade, there have been a significant number of cyber activity incidents involving drones. In 2017, at Moscow Airport, drones were used to disrupt GPS systems and radio communications. In 2019, in South Korea, drones were used to gather information on military infrastructure. In France in 2018, drones were employed in attacks on energy infrastructure, including surveillance of computer networks. There were also reports of drones being used in DDoS attacks, and in Syria in 2018, drones were used for intelligence gathering and spreading malware on military facilities.

So how does this happen?

  1. Connecting to Wireless Networks
    Drones can carry eavesdropping or “hacking” equipment that connects to open or weak Wi-Fi networks near strategic sites or intelligence organizations. Additionally, using specialized antennas, the drone can intercept information, steal passwords, or even deploy malware.
  2. Blocking Communications
    A drone can carry a radio wave transmitter to disrupt GPS systems, attack wireless communication networks, or create “blind spots” around a secure facility to prevent its operation before an attack or as an attack in itself.
  3. Social Engineering Attacks
    A drone can drop a branded USB drive or an “innocent” letter at the entrance to an organization, hoping someone will pick it up and connect it to an organizational computer – opening the door to an easy breach.
  4. Electronic Intelligence Gathering
    Installing sensors on drones allows them to eavesdrop on phone conversations, capture internal radio transmissions, or monitor electronic activity in the area.

The real danger lies in the fact that drones exploiting the cyber domain have hidden operational capabilities. They are very difficult to detect on the ground – they are small, quiet, and fast, and we may not even know they are in the area until the damage is done. Without a system that not only defends against drones but also detects suspicious cyber activities, an organization may not realize the breach and the damage until significant harm has been caused.

What can be done?

Understanding and recognizing the threat is the first step in providing a solution, says Yogev.
A comprehensive threat analysis must be conducted, and appropriate solutions should be implemented – such as neutralizing drones from a distance, before they reach the protected facility, after performing a detailed and accurate site survey that provides a complete picture of the risks, including cyber threats.

Additionally, in more sensitive areas, drone defense systems should be integrated with systems designed to detect suspicious cyber activity, to create a comprehensive solution that strengthens the defense against various threats.
In a world that is constantly advancing technologically and in terms of intelligence, security systems must be prepared not only to deal with physical attacks but also with cyberattacks conducted by drones.
Defense systems must constantly update and evolve, integrating advanced tools like wireless network scanners, AI technologies for detecting abnormal behavior, and specialized intelligence analysis to effectively address this emerging threat, concludes Yogev.

 

Skip to content