• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data?

March 20, 2020 by Miriam McNabb 4 Comments

Flash Alexander (publicdomainpictures.net)

A conversation with leading data protection expert Michael Bruemmer, VP of Data Breach Resolution at Experian, multinational consumer credit reporting company.  We talked to Bruemmer about a hacker’s favorite tool, “smishing”, and what consumers can do to protect themselves.

The Pineapple

Drones are a useful tool for many critical industrial applications.  But when hackers use drones to help make their hacking tools more effective, consumers need to be even more protective of their personal data.  Michael Bruemmer describes one such tool to DRONELIFE: meet the Pineapple.

“The Pineapple is a hand-held device that individual hackers (and cyberthieves) can purchase for about $99 on the Hak 5 website,” says Bruemmer. “While originally developed to be used by security professionals – the “good guys” – to help spotlight how too many unsecured Wi-Fi networks were easily subject to “spoofing attacks,” it soon fell into the hands of cybercriminals.”

“With the device in hand, a cybercriminal can easily steal sensitive data, like passwords to an online bank account, from nearby users connected to unsecured Wi-Fi networks, such as at a conference or a coffee shop,” Bruemmer explains. “The device, while certainly useful to security professionals testing the integrity of Wi-Fi networks, is legal for anyone to buy, and at just $99 it’s been very tempting to bad actors.”

Expanding the Reach with Drones

Bruemmer explains how combining hacking devices like this with drones could introduce new risks to consumers – allowing hackers to fly over parks or public spaces, scooping up data.  “[A]s more and more cities install mobile hot spots in busy urban areas such as parks, stadiums and business districts, the pool of unsecured online targets has gotten far deeper,” says Bruemmer. “Given the size of the Pineapple device it would not be complicated for a cybercriminal to attach the device to an equally inexpensive drone device. There are currently more than 1 million drone devices legally operating in the U.S. today and the market for drone devices is predicted to get close to $100 billion by the end of 2020.”

Hacking with drones isn’t a new idea – but with the proliferation of drones on the market, concerns are increasing.  “Discussions around the vulnerability goes back many years,” Bruemmer says.  “It has heightened in recent years because of how easy drones are to obtain and the ease of using it for bad intent.  Last year, the US Department of Homeland Security reportedly warned about data security issues when using Chinese-made drones that were unknowingly stealing information while the user had no idea, according to CNET.”

“We’ve seen this Pineapple device used in a stationary situation, but with drones the hackers can be portable and it’s even harder to get caught.  A major hack hasn’t happened yet, but the potential is there.”

Phishing, Smishing, and Deepfakes

While tools like the Pineapple can be used to steal credit card and other personal information, they aren’t the only dangers out there for consumers.  “There are many different ways cybercriminals can penetrate systems and steal information,” says Bruemmer. 

“Phishing” is sending fake emails – but hackers have evolved the technique.  “In our 2020 industry forecast paper, we address a new technique called “smishing,” which are phishing attempts that are sent through SMS text.  This is especially relevant right now, for example, in an election year; as candidates build out online communities, a campaign page can be easily spoofed – soliciting donations via a fake email, and a “smishing” text message designed to look like it comes from a fellow campaign supporter can gain trust even faster,” Bruemmer explains.  “Signs of smishing scams are similar to the traditional phishing emails you may receive including misspelled words, poor grammar and requests for personal information such as your social security number, credit card or bank account information. A good rule of thumb is to refrain from responding to text messages from unknown senders.”

The Downside of Advances in Digital Images and Computer Vision

Fake videos or audio files are also evolving to scam consumers.  “The phrase deepfake was first coined by users on Reddit in 2017. The Artificial Intelligence–based technology was first developed in the mid-1990s as a result of academic research into computer vision, an interdisciplinary science that studies how computers can gain high-level understanding from digital images, allowing machines to perform visual tasks once left to humans. However, in recent years the technology has been used by amateurs and even cybercriminals for illicit purposes, including swapping the faces of celebrities into online pornographic videos.”

“This has already been used to steal money. In fact, last year Symantec, a major cybersecurity company, said it had seen three successful audio attacks on private companies. In each, a company’s “CEO” called a senior financial officer to request an urgent money transfer,” Bruemmer says.

How to Protect Yourself

Bruemmer says that consumers can reduce their risk by following some guidelines.

“In general, there are several good security practices consumers can follow,” Bruemmer recommends:

  • Do not connect to public Wi-Fi.
  • Only access safe and reputable websites with the SSL security certificate (the s in https://).
  • Shredders are a smart way to destroy unneeded personal documents, like bank statements, so they don’t end up in the wrong hands.
  • Consumers should also be weary of suspicious emails and avoid clicking any links that could be phishing scams.
  • Password protecting devices and accounts can also help secure personal information, especially when it comes to a cell phone.
  • Mobile technology provides access to sensitive information, so setting a unique password, and changing it regularly, can help keep that information protected. Enabling remote finding and wiping software, which tracks the phone or destroys data if the phone is lost or stolen, is an extra step that could ensure the safety of personal information.
  • The risk of identity theft is also reduced by being careful about posting information, such as in social media.

Want more information? Check out this link to Experian’s Data Breach Industry Forecast.

 

Miriam McNabb

Miriam McNabb is the Editor-in-Chief of DRONELIFE and CEO of JobForDrones, a professional drone services marketplace, and a fascinated observer of the emerging drone industry and the regulatory environment for drones. Miriam has penned over 3,000 articles focused on the commercial drone space and is an international speaker and recognized figure in the industry.  Miriam has a degree from the University of Chicago and over 20 years of experience in high tech sales and marketing for new technologies.
For drone industry consulting or writing, Email Miriam.

TWITTER:@spaldingbarker

Subscribe to DroneLife here.

Filed Under: Applications, DL Exclusive, Drone News, Drone News Feeds, Drones in the News, Feature 1, Media, News, Telecommunications Tagged With: drone consumer fraud, drone hacking, drone news, experian

Reader Interactions

Trackbacks

  1. DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data? ⋆ says:
    March 22, 2020 at 9:02 am

    […] The complete article is here […]

    Reply
  2. DRONELIFE Unique: Can Hackers Use Drones to Steal Your Private Knowledge? - Drone Stuff Pro says:
    March 20, 2020 at 9:48 pm

    […] Supply hyperlink […]

    Reply
  3. DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data? | Drone Magazine says:
    March 20, 2020 at 6:42 pm

    […] Source […]

    Reply
  4. DRONELIFE Exclusive: Can Hackers Use Drones to Steal Your Personal Data? | Gadgets says:
    March 20, 2020 at 4:54 pm

    […] Source link […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

Six Takeaways from CIS White Paper on Drone Risks at Public Gatherings

As planning ramps up for the FIFA World Cup 2026, security agencies are preparing for one of the most complex…

Continue Reading Six Takeaways from CIS White Paper on Drone Risks at Public Gatherings

Matternet and SoftBank Robotics America Partner to Scale Drone Delivery Networks

Collaboration targets healthcare and enterprise logistics with focus on real-world deployment Matternet and SoftBank Robotics America have announced a strategic…

Continue Reading Matternet and SoftBank Robotics America Partner to Scale Drone Delivery Networks

FAA Reverses Course on Drone Flight Limits Near Federal Operations

FAA backs down on threat to prosecute drone pilots By DRONELIFE Features Editor Jim Magill The FAA has apparently backed…

Continue Reading FAA Reverses Course on Drone Flight Limits Near Federal Operations

Donecle Raises €10 Million to Expand Drone-Based Aircraft Inspection Platform

Funding will support international growth and further development of AI-driven maintenance solutions Donecle, a France-based company specializing in automated aircraft…

Continue Reading Donecle Raises €10 Million to Expand Drone-Based Aircraft Inspection Platform

Is the U.S. Ready for Drone Threats at World Cup Scale?

U.S. faces multiple challenges in counter-UAS buildup By DRONELIFE Features Editor Jim Magill (Editor’s note: This is part of a…

Continue Reading Is the U.S. Ready for Drone Threats at World Cup Scale?

FAA Moves to Close Drone Enforcement Gap with New DETER Program

As detection outpaces enforcement, the FAA introduces faster penalties for rule-breaking operators Detection Has Outpaced Enforcement Drone detection is no…

Continue Reading FAA Moves to Close Drone Enforcement Gap with New DETER Program

HYFIX Raises $15M to Build U.S.-Made Drone Chip Platform

New system-on-chip aims to replace fragmented electronics with a single secure architecture HYFIX Spatial Intelligence, Inc. has announced a $15…

Continue Reading HYFIX Raises $15M to Build U.S.-Made Drone Chip Platform

FCC Grants Conditional Approval to Sees.ai UAS, Signaling New Path for Foreign Drone Systems

Limited public details raise questions about “v.USA 1.0” and how international companies can meet U.S. security requirements The Federal Communications…

Continue Reading FCC Grants Conditional Approval to Sees.ai UAS, Signaling New Path for Foreign Drone Systems

UK Drone Package for Ukraine Signals Push to Scale Domestic Industry

Largest-ever MOD initiative supports Kyiv while strengthening UK drone manufacturing base As the global race to build sovereign drone capability…

Continue Reading UK Drone Package for Ukraine Signals Push to Scale Domestic Industry

What Are People Really Saying About the Commercial Drone Industry?

Industry survey will shape discussion on real-world challenges and opportunities in commercial drone operations Commercial UAV Expo has announced its…

Continue Reading What Are People Really Saying About the Commercial Drone Industry?

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT