• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data?

March 20, 2020 by Miriam McNabb 4 Comments

Flash Alexander (publicdomainpictures.net)

A conversation with leading data protection expert Michael Bruemmer, VP of Data Breach Resolution at Experian, multinational consumer credit reporting company.  We talked to Bruemmer about a hacker’s favorite tool, “smishing”, and what consumers can do to protect themselves.

The Pineapple

Drones are a useful tool for many critical industrial applications.  But when hackers use drones to help make their hacking tools more effective, consumers need to be even more protective of their personal data.  Michael Bruemmer describes one such tool to DRONELIFE: meet the Pineapple.

“The Pineapple is a hand-held device that individual hackers (and cyberthieves) can purchase for about $99 on the Hak 5 website,” says Bruemmer. “While originally developed to be used by security professionals – the “good guys” – to help spotlight how too many unsecured Wi-Fi networks were easily subject to “spoofing attacks,” it soon fell into the hands of cybercriminals.”

“With the device in hand, a cybercriminal can easily steal sensitive data, like passwords to an online bank account, from nearby users connected to unsecured Wi-Fi networks, such as at a conference or a coffee shop,” Bruemmer explains. “The device, while certainly useful to security professionals testing the integrity of Wi-Fi networks, is legal for anyone to buy, and at just $99 it’s been very tempting to bad actors.”

Expanding the Reach with Drones

Bruemmer explains how combining hacking devices like this with drones could introduce new risks to consumers – allowing hackers to fly over parks or public spaces, scooping up data.  “[A]s more and more cities install mobile hot spots in busy urban areas such as parks, stadiums and business districts, the pool of unsecured online targets has gotten far deeper,” says Bruemmer. “Given the size of the Pineapple device it would not be complicated for a cybercriminal to attach the device to an equally inexpensive drone device. There are currently more than 1 million drone devices legally operating in the U.S. today and the market for drone devices is predicted to get close to $100 billion by the end of 2020.”

Hacking with drones isn’t a new idea – but with the proliferation of drones on the market, concerns are increasing.  “Discussions around the vulnerability goes back many years,” Bruemmer says.  “It has heightened in recent years because of how easy drones are to obtain and the ease of using it for bad intent.  Last year, the US Department of Homeland Security reportedly warned about data security issues when using Chinese-made drones that were unknowingly stealing information while the user had no idea, according to CNET.”

“We’ve seen this Pineapple device used in a stationary situation, but with drones the hackers can be portable and it’s even harder to get caught.  A major hack hasn’t happened yet, but the potential is there.”

Phishing, Smishing, and Deepfakes

While tools like the Pineapple can be used to steal credit card and other personal information, they aren’t the only dangers out there for consumers.  “There are many different ways cybercriminals can penetrate systems and steal information,” says Bruemmer. 

“Phishing” is sending fake emails – but hackers have evolved the technique.  “In our 2020 industry forecast paper, we address a new technique called “smishing,” which are phishing attempts that are sent through SMS text.  This is especially relevant right now, for example, in an election year; as candidates build out online communities, a campaign page can be easily spoofed – soliciting donations via a fake email, and a “smishing” text message designed to look like it comes from a fellow campaign supporter can gain trust even faster,” Bruemmer explains.  “Signs of smishing scams are similar to the traditional phishing emails you may receive including misspelled words, poor grammar and requests for personal information such as your social security number, credit card or bank account information. A good rule of thumb is to refrain from responding to text messages from unknown senders.”

The Downside of Advances in Digital Images and Computer Vision

Fake videos or audio files are also evolving to scam consumers.  “The phrase deepfake was first coined by users on Reddit in 2017. The Artificial Intelligence–based technology was first developed in the mid-1990s as a result of academic research into computer vision, an interdisciplinary science that studies how computers can gain high-level understanding from digital images, allowing machines to perform visual tasks once left to humans. However, in recent years the technology has been used by amateurs and even cybercriminals for illicit purposes, including swapping the faces of celebrities into online pornographic videos.”

“This has already been used to steal money. In fact, last year Symantec, a major cybersecurity company, said it had seen three successful audio attacks on private companies. In each, a company’s “CEO” called a senior financial officer to request an urgent money transfer,” Bruemmer says.

How to Protect Yourself

Bruemmer says that consumers can reduce their risk by following some guidelines.

“In general, there are several good security practices consumers can follow,” Bruemmer recommends:

  • Do not connect to public Wi-Fi.
  • Only access safe and reputable websites with the SSL security certificate (the s in https://).
  • Shredders are a smart way to destroy unneeded personal documents, like bank statements, so they don’t end up in the wrong hands.
  • Consumers should also be weary of suspicious emails and avoid clicking any links that could be phishing scams.
  • Password protecting devices and accounts can also help secure personal information, especially when it comes to a cell phone.
  • Mobile technology provides access to sensitive information, so setting a unique password, and changing it regularly, can help keep that information protected. Enabling remote finding and wiping software, which tracks the phone or destroys data if the phone is lost or stolen, is an extra step that could ensure the safety of personal information.
  • The risk of identity theft is also reduced by being careful about posting information, such as in social media.

Want more information? Check out this link to Experian’s Data Breach Industry Forecast.

 

Miriam McNabb

Miriam McNabb is the Editor-in-Chief of DRONELIFE and CEO of JobForDrones, a professional drone services marketplace, and a fascinated observer of the emerging drone industry and the regulatory environment for drones. Miriam has penned over 3,000 articles focused on the commercial drone space and is an international speaker and recognized figure in the industry.  Miriam has a degree from the University of Chicago and over 20 years of experience in high tech sales and marketing for new technologies.
For drone industry consulting or writing, Email Miriam.

TWITTER:@spaldingbarker

Subscribe to DroneLife here.

Filed Under: Applications, DL Exclusive, Drone News, Drone News Feeds, Drones in the News, Feature 1, Media, News, Telecommunications Tagged With: drone consumer fraud, drone hacking, drone news, experian

Reader Interactions

Trackbacks

  1. DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data? ⋆ says:
    March 22, 2020 at 9:02 am

    […] The complete article is here […]

    Reply
  2. DRONELIFE Unique: Can Hackers Use Drones to Steal Your Private Knowledge? - Drone Stuff Pro says:
    March 20, 2020 at 9:48 pm

    […] Supply hyperlink […]

    Reply
  3. DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data? | Drone Magazine says:
    March 20, 2020 at 6:42 pm

    […] Source […]

    Reply
  4. DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data? | Gadgets says:
    March 20, 2020 at 4:54 pm

    […] Source link […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

Unprepared for Drone War? Europe and the US Face Procurement Crisis

Military drone procurement is becoming one of the defining defense challenges of this decade. Europe is confronting a paradox at…

Continue Reading Unprepared for Drone War? Europe and the US Face Procurement Crisis

Designing Resilient Roads on Java’s Southern Coast: A Blue Marble Geographics Case Study

As governments invest in infrastructure to unlock tourism and regional growth, the challenge is no longer just building roads. It…

Continue Reading Designing Resilient Roads on Java’s Southern Coast: A Blue Marble Geographics Case Study

Woolpert and Saildrone Deploy Autonomous USV for NOAA Seafloor Mapping Near Mariana Islands

Woolpert and Saildrone have partnered to collect and process bathymetric survey data for NOAA’s Ocean Exploration and Office of Coast…

Continue Reading Woolpert and Saildrone Deploy Autonomous USV for NOAA Seafloor Mapping Near Mariana Islands

Canada’s Defence Industry Unites: ACDC Launches to Advocate for Autonomous and Drone Capabilities

A new trade association is giving Canadian defense technology companies — including drone and autonomous systems developers — a unified…

Continue Reading Canada’s Defence Industry Unites: ACDC Launches to Advocate for Autonomous and Drone Capabilities

March Public Safety Drone Review: NUSTL Experts to Address Counter-UAS and FIFA World Cup Security

Register here to join the live broadcast on Tuesday, March 3 at 3 p.m. EST. March Public Safety Drone Review…

Continue Reading March Public Safety Drone Review: NUSTL Experts to Address Counter-UAS and FIFA World Cup Security

Epirus and Digital Force Technologies Partner on Integrated Counter-UAS Kill Chain

Epirus and Digital Force Technologies (DFT) have announced a partnership to deliver a fully integrated counter-UAS kill chain, unifying their…

Continue Reading Epirus and Digital Force Technologies Partner on Integrated Counter-UAS Kill Chain

TV Asahi and KDDI Smart Drone Partner for Disaster News Drone Deployment

This article published in collaboration with JUIDA, the Japan UAS Industrial Development Association.     TV Asahi and KDDI Smart Drone…

Continue Reading TV Asahi and KDDI Smart Drone Partner for Disaster News Drone Deployment

House Blocks ROTOR Act; Focus Shifts to ALERT Act and ADS-B Policy

AOPA urges action on collision avoidance and pilot privacy as Congress debates next steps The U.S. House of Representatives has…

Continue Reading House Blocks ROTOR Act; Focus Shifts to ALERT Act and ADS-B Policy

Flying Lion Launches 2026 DFR Remote Pilot Training Courses

POST-Certified Program Expands Regional Access for Public Safety Agencies Flying Lion, Inc. has announced the launch of its 2026 Drone…

Continue Reading Flying Lion Launches 2026 DFR Remote Pilot Training Courses

Teledyne FLIR OEM Launches Lepton XDS Dual Thermal-Visible Camera Module

Compact MSX-Enabled System Targets Rapid OEM Integration Across Embedded and Industrial Applications Teledyne FLIR OEM has introduced the Lepton® XDS,…

Continue Reading Teledyne FLIR OEM Launches Lepton XDS Dual Thermal-Visible Camera Module

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT