In recent years, the use of drones for various tasks by different organizations around the world has increased. Security systems worldwide are preparing and defending against the majority of physical threats posed by crime and terror organizations – such as attacks, explosive devices, suicide drones, and drones used for intelligence gathering through photography, among others.
But in the modern era, the drone is not just a “flying device” – it is also a platform for sophisticated cyberattacks.
Yogev Yadin, Regional Director at Skylock, stated: “Although the threat most people associate with drones is their use as physical attack tools, we must consider that they can also be used as powerful and dangerous cyberattack tools. At the same time, the ability to identify this threat in real-time is extremely limited.”
Over the last decade, there have been a significant number of cyber activity incidents involving drones. In 2017, at Moscow Airport, drones were used to disrupt GPS systems and radio communications. In 2019, in South Korea, drones were used to gather information on military infrastructure. In France in 2018, drones were employed in attacks on energy infrastructure, including surveillance of computer networks. There were also reports of drones being used in DDoS attacks, and in Syria in 2018, drones were used for intelligence gathering and spreading malware on military facilities.
So how does this happen?
The real danger lies in the fact that drones exploiting the cyber domain have hidden operational capabilities. They are very difficult to detect on the ground – they are small, quiet, and fast, and we may not even know they are in the area until the damage is done. Without a system that not only defends against drones but also detects suspicious cyber activities, an organization may not realize the breach and the damage until significant harm has been caused.
What can be done?
Understanding and recognizing the threat is the first step in providing a solution, says Yogev.
A comprehensive threat analysis must be conducted, and appropriate solutions should be implemented – such as neutralizing drones from a distance, before they reach the protected facility, after performing a detailed and accurate site survey that provides a complete picture of the risks, including cyber threats.
Additionally, in more sensitive areas, drone defense systems should be integrated with systems designed to detect suspicious cyber activity, to create a comprehensive solution that strengthens the defense against various threats.
In a world that is constantly advancing technologically and in terms of intelligence, security systems must be prepared not only to deal with physical attacks but also with cyberattacks conducted by drones.
Defense systems must constantly update and evolve, integrating advanced tools like wireless network scanners, AI technologies for detecting abnormal behavior, and specialized intelligence analysis to effectively address this emerging threat, concludes Yogev.
Accessibility Privacy Policy By Skylock ltd Ⓒ Development & design by: Webnoise