• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks

October 17, 2019 by Miriam McNabb 7 Comments

At the DroneDeploy 2019 Conference,  an expert on cybersecurity and automated tools explained why hackers are attacking infrastructure with drones – and how to stop them.  Rhea Naidoo, co-founder and Director of Automated Solutions at Cambrian Cyber Group, came from a mining background: combined with her current expertise in cybersecurity she has a broad perspective on the potential risks of hackers using – or attacking – drones.

Why are industrial organizations being targeted – and who is targeting them?

Naidoo says that the appetite to attack critical infrastructure, and possibility to pivot into the operational technology (OT) or the information technology (IT) networks, has never been higher.  Hackers can deploy “attack” drones – low cost, easy to use, and hard to detect – to carry out surveillance, capture data or cause damage by collision.  Meanwhile, the availability of tools to hack drones used by companies for legitimate purposes is increasing rapidly: “Widespread use of militarized drones in global warfare has results in the proliferation of tools and methods to attack them.  And industrial drones have lower security controls than military drones,” says Naidoo.

What is the risk to the business?

Since 2010, says Naidoo, cyber-attacks targeting OT have escalated – resulting in multiple attacks on the US and EU energy sector, sabataged operations at Saudi petrochemical plants, and rumors of Russian spies targeting U.S. Nuclear facilities.  Attacks fall into 3 general categories:

  • Confidentiality attacks: stealing confidential data;
  • Integrity: manipulation of controls to cause inefficiencies, or the disabling of alarms and fail-safe logic to mask problems;
  • Availability: taking a service offline,or  slowing or stopping operational processes.

What kinds of drone attacks are hackers using?

Using drones to attack industrial businesses can be subtle and sophisticated – or not.  Naidoo says that there are a wide variety of ways that hackers are utilizing drones: and they range from WiFI or GPS spoofing to just crashing a drone into a piece of equipment to damage it.

Those are “attack drones”: and in addition to crashing into a piece of equipment they might crash into another drone or aircraft, or hack another drones in flight, either to take control of it or embed malware.  (Note: Naidoo says this is more of a worry when you aren’t dealing with standard industrial drones, but the homemade type – your off-the-shelf product is probably safe.). “Malicious drones” carry a payload to conduct surveillance or capture data.  There is bluetooth sniffing to steal data from a device; RFID scanning of access cards, credit cards, or other sensitive information; and GPS spoofing – sending a drone to the wrong address.  “Carrier drones” can set up a malicious WiFI network that imitates an organization’s WiFI network, allowing a hacker to see all of the traffic.

What can companies do to protect themselves?

There are a number of technology tools available to protect industries from malicious attacks.  Geofencing, SoundWave detection like radar, or other scanning methods common in counter drone solutions can be used to keep drones away from a property.  More importantly, however, is what Naidoo calls “good security hygiene”.  Drones used by a company for inspections or other purposes need to be kept up to date: high end drones come with built-in protections against hijacking.  Data transfer from the drone to the network must be unidirectional and protected.  OT networks must have necessary controls.  Most importantly, companies should assign responsibility and accountability for the protection of the OT network.  “The OT network is at the perimeter of the organization – that’s something that IT departments have moved away from.”

While the idea of hackers using drones to attack an operational technology network may seem farfetched, it’s still something that Naidoo says needs to be considered in a good cybersecurity program.   “We’re living in a world where it used to be OK for companies to live with an ostrich approach, and put their heads in the sand,” says Naidoo.  “With the current push from regulators for more transparency into the network, any problems get revealed.”

Miriam McNabb

Miriam McNabb is the Editor-in-Chief of DRONELIFE and CEO of JobForDrones, a professional drone services marketplace, and a fascinated observer of the emerging drone industry and the regulatory environment for drones. Miriam has penned over 3,000 articles focused on the commercial drone space and is an international speaker and recognized figure in the industry.  Miriam has a degree from the University of Chicago and over 20 years of experience in high tech sales and marketing for new technologies.
For drone industry consulting or writing, Email Miriam.

TWITTER:@spaldingbarker

Subscribe to DroneLife here.

Filed Under: Anti-drone technology, Drone News Feeds, News Tagged With: Cambrian Cyber Group, counterdrone technology, cybersecurity, drone hackers, drones and cybersecutiry, Rhea Naidoo

Reader Interactions

Trackbacks

  1. Fall is Here But Blended and Complex Threats Never Left – NSCAM Edition says:
    October 25, 2019 at 6:27 pm

    […] DRONELIFE: “Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks” 17 Oct 2019 by Miriam McNabbon (@spaldingbarker). “[T]he appetite to attack critical infrastructure, and possibility to pivot into the operational technology (OT) or the information technology (IT) networks, has never been higher.  Hackers can deploy “attack” drones – low cost, easy to use, and hard to detect – to carry out surveillance, capture data or cause damage by collision.” Blending both physical and cyber attack vectors, drone attacks “in addition to crashing into a piece of equipment they might crash into another drone or aircraft, or hack another drones in flight, either to take control of it or embed malware.” However, there are security best practices and technologies that companies can and should adopt to secure drones and protect the OT networks hosting drone activity. […]

    Reply
  2. Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks | Drone News says:
    October 21, 2019 at 11:24 am

    […] Source link […]

    Reply
  3. Drones Pose a Cybersecurity Risk to Businesses - The Defence Works says:
    October 18, 2019 at 3:39 am

    […] Dronelife’s Mirium McNabb reports on the DroneDeploy 2019 Conference where a cybersecurity expert, Rhea Naidoo, warned hackers are attacking business infrastructure with drones. […]

    Reply
  4. Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks – Top Drones & reviews says:
    October 17, 2019 at 11:06 pm

    […] post Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks appeared first on […]

    Reply
  5. Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks – DroneLife – IAM Network says:
    October 17, 2019 at 8:36 pm

    […] Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks  DroneLife […]

    Reply
  6. Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks – Air and Ground says:
    October 17, 2019 at 2:29 pm

    […] Source link […]

    Reply
  7. Drones and Cybersecurity: An Expert Opinion on Protecting Industry Against Drone and Data Attacks | Drone Magazine says:
    October 17, 2019 at 12:34 pm

    […] Source […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

AirData and BRINC Integration Brings Automated Flight Records to Public Safety Drone Programs

New integration captures flight data automatically, supporting scalable and auditable drone operations AirData has announced a new integration with BRINC,…

Continue Reading AirData and BRINC Integration Brings Automated Flight Records to Public Safety Drone Programs

Sentrycs Lands Major Counter-Drone Contracts Across World Cup Cities

Sentrycs systems to protect skies in U.S., Mexico, Canada By DRONELIFE Features Editor Jim Magill (Editor’s note: This is part…

Continue Reading Sentrycs Lands Major Counter-Drone Contracts Across World Cup Cities

Kraus Hamdani Aerospace Demonstrates Wireless Power Beaming to K1000ULE at Shaw AFB

Kraus Hamdani Aerospace and PowerLight Technologies sustain the K1000ULE in flight using laser-based wireless power beaming, maintaining continuous ISR operations…

Continue Reading Kraus Hamdani Aerospace Demonstrates Wireless Power Beaming to K1000ULE at Shaw AFB

Sion Power Launches Two High Energy Density Batteries for Military Drones

Sion Power’s Licerion Strike and Echo cells exceed 500 Wh/kg, enabling combat drones to fly two to three times longer…

Continue Reading Sion Power Launches Two High Energy Density Batteries for Military Drones

UNOS and NASA Partner to Study Drone Organ Transport

UNOS and NASA launch a joint study to examine how UAV flights affect organ viability and how drones could improve…

Continue Reading UNOS and NASA Partner to Study Drone Organ Transport

A Day in the Life in Ouachita Parish: Inside a Real-Time Crime Center Where Drones Shape the Response

From first call to final decision, how aerial intelligence is helping Ouachita Parish deputies arrive informed, and safer. A System…

Continue Reading A Day in the Life in Ouachita Parish: Inside a Real-Time Crime Center Where Drones Shape the Response

Amusement Parks Push FAA for Drone Flight Restrictions Before Summer

Amusement parks push for FAA drone flight restrictions to protect summer crowds from unauthorized UAV overflights this season. By Dronelife…

Continue Reading Amusement Parks Push FAA for Drone Flight Restrictions Before Summer

SkyDrive Earns Japan ADO Certification, Advances 2028 eVTOL Commercial Launch

SkyDrive receives ADO certification from Japan’s Civil Aviation Bureau, becoming the first dedicated eVTOL developer in Japan to achieve the…

Continue Reading SkyDrive Earns Japan ADO Certification, Advances 2028 eVTOL Commercial Launch

Dronamics Opens Japan Subsidiary, Names Asia Air Survey as First Japanese Investor

Dronamics has announced a strategic investment from Asia Air Survey Co., Ltd. (TSE: 9233). The company is also establishing a Japanese subsidiary, Dronamics…

Continue Reading Dronamics Opens Japan Subsidiary, Names Asia Air Survey as First Japanese Investor

Beyond the Patrol Car: Drones Join the Public Safety Ecosystem

At Motorola Solutions Summit 2026, agencies describe a shift from standalone drone programs to fully integrated response ecosystems The Motorola…

Continue Reading Beyond the Patrol Car: Drones Join the Public Safety Ecosystem

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT