Recently Security researchers have found a backdoor in Parrot AR Drones, manufactured by a French company which allows malicious attackers to remotely hijack the drone.
Once again Indian Security Researcher Rahul Sasi has claimed to have developed the first malware dubbed a MalDrone [Malware Drone] for a Drone that performs a number of tasks. He is going to demonstrate his research in the upcoming Nullcon Goa Event this February 7th, 2015. This Nullcon event is going to be held in Goa (India) and the good news is that registration and ticket booking is ongoing.
we would show infecting a drone with Maldrone and expecting a reverse tcp connection from drone. Once connection is established we can interact with the software as well as drivers/sensors of drone directly.The researcher claims that his backdoors kill the autopilot and take control of the Drones. The backdoor still resides it reset also. He mentioned that his malware can also spread to other drones and can also backdoor other drones that are within the wireless range.
Here are some of the features of the MalDrone are -:
- Maldrone will get silently installed on a drone.
- Interact with the device drivers and sensors silently.
- Let the bot master control the drone remotely.
- Escape from the Drone owner to the Bot master.
- Remote surveillance.
- Spread to other drones
So it will be quite interesting to look at the demonstration that is going to be shown at the Nullcon event. For the demo purpose, Rahul is using Parrot Ar Drone 2.0 and DJI Phantom as Maldrone is developed for AR drone arm Linux. You can check the full details of what Rahul is going to demonstrate at Nullcon from here.