Drones, malware and automated hacking

Drones are awesome, malware is beautiful and hacking is something which will always be possible. In this article, I am going to explain the possibilities of malware, drones and hacking.

There are various types of malware. Some will focus on stealing information and some will focus on controlling the victim device. Each type of malware is beautiful. The reason is very simple, someone was insane enough to write a piece of code which will get our attention.

Do not get me wrong. It is fucked up if you get infected with malware, but if you are able to design and code malware, then you are performing art.

Hacking drones

The developer Samy Kamkar has crafted a piece of code which is capable of hijacking Parrot AR 2 drones. The code is written and run in PERL and it can be installed on any type of Linux operating system.

Samy Kamkar has titled his piece of code “SkyJack”. The “SkyJack” software will run while the host (drone) is flying around. Once the drone finds a vulnerable Parrot AR 2 drone, it will send WiFi signals to the Parrot AR 2 drone. The signals will hold commands which will allow the operator of SkyJack to control the hijacked Parrot AR 2 drones.

Parrot Controller
Parrot Controller

The proof of concept which has been crafted by Samy Kamkar is very straight forward. You will need an Raspberry PI, USB battery, WiFi adapter and a strong “drone” or “helicopter” which will carry the mentioned items.

Raspberry PI B+
Raspberry PI B+

Now just imagine if you take the SkyJack code and adjust it in such type of way that it will also attack WiFi Access Points, Smartphones and other devices which make use of the WiFi protocol.

Get the Malware to the Choppa!

Now that we have an idea of how it is possible to use drones to infect devices, we are are able to extend the proof of concept with our own ideas.

We could add a second drone to the proof of concept. The second drone will operate as the server (command and control) environment. This will provide us two drones.

The attack drone

The attack drone will search the environment for vulnerable devices, once it finds a vulnerable device it will connect to the server drone. The server drone will provide the right library and tools to the attack drone.

This will allow the attack drone to perform fast attacks and it will preserve battery.