Jonathan Anderson creates a system capable of hacking the signal of any drone while flying

Jonathan anderson

It is not the first time that we talk about how researchers and developers from half the world, not to comment on the projects that are being carried out by several private companies financed by the defense departments of several countries, are working to develop a effective method of lowering a drone that may be flying in restricted airspace without endangering your integrity, the only way that exists at the moment to later be able to intensify its owner.

Thanks to this we have been able to see how drones equipped with nets are developed that capture other drones, powerful lasers, signal interceptors and even a program in which eagles were trained to go hunting any device that entered their airspace. Thanks to the work of jonathan andresson, from the Advanced Security Research Group of Trend Micro DVLabs, today we can talk about a software capable of hacking the control signal of unmanned ships.

They find a way to exploit a vulnerability in the DSMx protocol for communication between the station and the drone.

As mentioned, this computer security expert has managed to create a system capable of interfering with the aircraft's wireless transmission signal, specifically the DSMx protocol. To make use of this system, a vulnerability is exploited, which is found when a failure occurs in the transmission of information between the transmitter and the receiver, altering the normal operation of the aircraft itself.

Thanks precisely to this method, a much simpler and more efficient way can be found and developed to lower any drone before having to tear it down with much less orthodox ways. We have a clear example in functionality 'back home'present in many units, which is executed when, among other things, the signal is lost.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.