{"id":6880,"date":"2017-04-19T17:11:00","date_gmt":"2017-04-19T21:11:00","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/?p=6880"},"modified":"2017-09-24T20:09:50","modified_gmt":"2017-09-24T14:39:50","slug":"drone-gone-in-11-milliseconds","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/drone-gone-in-11-milliseconds\/6880\/","title":{"rendered":"Drone gone in 11 milliseconds"},"content":{"rendered":"<p>Drones are everywhere nowadays. Amazon<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.usatoday.com\/story\/tech\/news\/2016\/12\/14\/amazon-delivered-its-first-customer-package-drone\/95401366\/\" target=\"_blank\" rel=\"nofollow noopener\">delivers packages<\/a><span class=\"Apple-converted-space\">\u00a0<\/span>by drone. Filmmakers and media workers launch cameras into the air to take attractive wide shots. Some enthusiasts who don\u2019t mind paying $500 or more for a smart toy use drones to explore the sky or take video of friends\u2019 weddings.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2017\/04\/05090410\/drone-gone-new-featured-1-1024x673.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14693\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2017\/04\/05090410\/drone-gone-new-featured-1-1024x673.jpg\" alt=\"Drone gone in 11 milliseconds\" width=\"1460\" height=\"960\"><\/a><\/p>\n<p>It\u2019s easy to picture yourself outside with your new $500 drone, launching it into the air and \u2026 watching helplessly as the craft flies out of sight, ignoring the controller in your hands.<\/p>\n<p>This is no firmware bug or controller failure: Your drone has been hijacked. At the<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/sas\/\" target=\"_blank\" rel=\"noopener nofollow\">Security Analyst Summit<\/a>, security expert Jonathan Andersson proved that a skilled malefactor can make a device that can hijack drones in mere seconds.<\/p>\n<p>Andersson used a<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Software-defined_radio\" target=\"_blank\" rel=\"nofollow noopener\">software-defined radio<\/a><span class=\"Apple-converted-space\">\u00a0<\/span>(SDR), a drone\u2019s control unit, a microcomputer, and some other electronic equipment to make such a device. He called it Icarus. With the help of the SDR, Andersson tuned to the frequency a drone uses to communicate with its controller, and then he experimented until he found how exactly the signals were transmitted between the devices.<\/p>\n<div class=\"kasbanner-banner kasbanner-image\"><a title=\"SAS 2017 Promo\" href=\"https:\/\/sas.kaspersky.com\/?utm_medium=blg&amp;utm_source=kd_banner_170405&amp;utm_campaign=ww_sas2017promo\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2017\/04\/05091027\/SAS-Banner-KB.png\"><\/a><\/div>\n<p>It took a while for Andersson to learn how data transfer works between a drone and its control unit, especially because they hop channels every 11 milliseconds. Nevertheless, if you can do it once, the path to hijacking a drone becomes clear; developers of the smart toys all use similar protocols.<\/p>\n<p>Developers follow the popular<span class=\"Apple-converted-space\">\u00a0<\/span><em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\" target=\"_blank\" rel=\"nofollow noopener\">security through obscurity<\/a><\/em><span class=\"Apple-converted-space\">\u00a0<\/span>method, counting on the complexity of protocols and neglecting strong encryption. Icarus can hack their primitive encryption and send a series of commands to hijack a craft during the 11 milliseconds a device waits before hopping channels.<\/p>\n<p>As a result, the drone\u2019s legitimate controller becomes useless and control goes to the malicious one \u2014 literally on the fly. The next video shows how it works in the real world.<\/p>\n<p><span class=\"embed-youtube\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/NRr19hdsjoY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/span><\/p>\n<p>Andersson explained that this threat can potentially influence the whole drone industry \u2014 from cheap toys to expensive, professional craft \u2014 because drones and controller units use data transfer protocols that are vulnerable to the same type of attack.<\/p>\n<p>Stronger encryption could fix the problem, but it\u2019s not that easy \u2014 many controllers do not support software updates. Moreover, strong encryption requires substantial computation capacity, which leads to additional energy consumption by the controller<span class=\"Apple-converted-space\">\u00a0<\/span><em>and<\/em><span class=\"Apple-converted-space\">\u00a0<\/span>the aircraft. The power problem really complicates the situation: When it comes to drones, every ounce and watt-hour is valuable.<\/p>\n<p>We\u2019d like to believe that developers will solve this problems in the very near future. It\u2019s sad to wave goodbye to a hijacked drone! Filmmakers will be even more sad: Their drones cost thousands and even tens of thousands of dollars \u2014 and they\u2019re just as easy to hack.<\/p>\n<div class=\"kasbanner-banner kasbanner-image\"><a title=\"Earth 2050: peer into the future!\" href=\"https:\/\/2050.earth\/?utm_medium=blg&amp;utm_source=kd_banner_170405&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2017\/04\/05091024\/Banner_1460x300_earth2050.png\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Drones are everywhere nowadays. Amazon\u00a0delivers packages\u00a0by drone. Filmmakers and media workers launch cameras into the air to take attractive wide shots. Some enthusiasts who don\u2019t mind paying $500 or more<\/p>\n","protected":false},"author":675,"featured_media":6881,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[2006,493,261,868,2021,2022,1563,337,2011,97],"class_list":{"0":"post-6880","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-thesas2017","9":"tag-drones","10":"tag-encryption","11":"tag-hack","12":"tag-hexacopter","13":"tag-hijacking","14":"tag-quadcopter","15":"tag-sas","16":"tag-sas-2017","17":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/drone-gone-in-11-milliseconds\/6880\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/drone-gone-in-11-milliseconds\/5603\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/thesas2017\/","name":"#TheSAS2017"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=6880"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6880\/revisions"}],"predecessor-version":[{"id":7386,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/6880\/revisions\/7386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/6881"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=6880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=6880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=6880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}