Wi-Fi Signal-Sniffing Drones

digital servicesThe next major network security threat could come from the sky, in the form of drones equipped with video cameras and the ability to sniff out mobile devices and their unique identifiers, perhaps even establishing rogue network access points in the sky that could be used to hack sensitive government or corporate networks.

That’s the potential threat, according to security specialists and at least one network security company offering detection equipment to address the new threat from the sky posed by network-hacking drones.

The inherent openness of Wi-Fi and other wireless networks, along with the proliferation of mobiles devices constantly seeking network connections, provide a tempting target for signal-sniffing drones. Experts stressed that the security perimeter of an office building will now have to include the airspace around the structure, because that airspace can be easily surveyed by drones at standoff distances capable of relaying video about, say, an agency’s wireless infrastructure.

wasp-drone-plane-sniffs-open-wifi-networks_2

WASP Drone Plane Sniffs Open Wifi Networks. Mike Tassey and Rich Perkins (r) describe how they retrofitted a U.S. Army surplus target drone.

The WASP (above) stands for “Wi-Fi Aerial Surveillance Platform.”

Forget Wi-Fi war driving. Now it’s war flying.

Mike Tassey, a security consultant who works for the U.S. government intelligence community said “There’s some pretty evil stuff you can do with the U.S. Army target drone from the sky.”

“We can identify a target by his cell phone and follow him home to where enterprise security doesn’t reach,” Rich Perkins, a security engineer who describes his job as “supporting the U.S. government and co-created the drone. “We can reverse engineer someone’s life.”

“UAVs pose a couple of unique challenges to people who are responsible for protecting things,” Tassey said.

Even the modest payload of UAVs could be devastating in biological or radiological attacks. Drug smugglers–or, perhaps, pharmaceutical entrepreneurs–could carry around $400,000 in heroin through one flight across a national border. And the small size of UAVs, and virtually nonexistent presence on radar, make them a challenge to detect and shoot down.

The market for military, commercial, and recreational drones is on track to rise to $89 billion in the next decade.

This drone can steal what’s on your phone:

Security analyst Glenn Wilkinson described how he rigged a distributed tracking and profiling framework called “Snoopy” to a quadcopter drone.

drones and phones“I can get to altitude, I can fly this device at [an altitude of] about 80 meters. You won’t see it, you won’t hear it, but with the right antenna I’ll be able to detect [device] signals from the ground,” Wilkinson told the Black Hat Asia hacker conference earlier this year.

By 2017, drone sales in the U.S. could reach 110,000 units annually.

Consumer drones are readily available and relatively inexpensive—something that has not been lost on the military services, which have stepped up their search for antidrone technology and increased their focus on Electronic warfare. Countering an adversary’s surveillance or attack capabilities has been the major focus, but airborne cyberattacks could also come into play. Not only do bases at home and abroad have wireless networks, but wireless forms the backbone of tactical battlefield communications.

Domestically, regulators at the Federal Aviation Administration are scrambling to come up with rules on how commercial drones can be operated. Observers believe regulators are being caught flat-footed when it comes to potential wireless hacking scenarios.

Hence, companies specializing in wireless network analysis tools are attempting to fill the gap with security measures that could help identify and locate the source of threats, then mitigate their effects via detection tools installed in servers at customers’ data centers.

These vendors stress the importance of installing frequently updated real-time security measures against emerging threats like drone hackers. Those patches would normally take weeks to install and configure.

darpa_drone_wifiThe threat to wireless networks will only grow with the explosion of mobile data delivered by ever increasing numbers of mobile devices that serve as entry points into wireless networks. “Security is going to be more and more of a concern” as network administrators struggle to control mobile devices connecting to corporate or government Wireless LANs, warned Milind Bhise, director of product marketing and management at Fluke Networks AirMagnet .

Among other network security products, the company frequently upgrades “dynamic threat signature” models, or rules, for handling newly discovered vulnerabilities. They are used along with its AirMagnet Enterprise servers and sensors installed in data centers to detect and defend against network intrusions, perhaps even emerging vulnerabilities like the wireless signal-sniffing drone hovering outside an office window.

“In effect,” added Greg Rayburn, a wireless security analyst with Fluke Networks, “drones are flying network access points” that could be used by hackers to breach corporate networks. Potential hackers could, for example, attach “WiFi Pineapple—small, inexpensive hacking tools that spoof Wi-Fi hotspots—to drones already equipped with several cameras in order to hack in to unsecure networks, Rayburn added.

police drones monitorThose attack scenarios could include attaching a rogue access point or hacking into an enterprise wireless network and stealing data such as credit card information, AirMagnet said.

The threat signature updates, which AirMagnet said are available to current customers, could be used not only to detect a drone-based intrusion but also when the drone is streaming video and which commands the controller is sending.

Along with smartphones, tablets, bluetooth, and other devices used  to access data, hacker drones could also detect signals being emitted from everything from a Google Glass device and near-field communication chips in smart cards to wireless pacemakers.

RFID chips in many everyday productsThese devices are “shouting out information,” warned Wilkinson, the security analyst. That information could include unique identifiers like Wi-Fi locations and the Media Access Control addresses for unique devices. Wilkinson said a hacker could then figure out owner information using other emissions such as Radio Frequency Identification (RFID) signals.

Hacking Team’s Government Spying Software

Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities against Android, iOS, Windows Mobile, and BlackBerry smart phones.

They allow, for example, for covert collection of emails, text messages, call history and address books, and they can be used to log keystrokes and obtain search history data. They can take screenshots, record audio from the phones to monitor calls or ambient conversations, hijack the phone’s camera to snap pictures or piggyback on the phone’s GPS system to monitor the user’s location. The Android version can also enable the phone’s Wi-Fi function to siphon data from the phone wirelessly instead of using the cell network to transmit it. The latter would incur data charges and raise the phone owner’s suspicion.

cyber-espionage networkOnce on a system, the iPhone module uses advance techniques to avoid draining the phone’s battery, turning on the phone’s microphone, for example, only under certain conditions.

“They can just turn on the mic and record everything going on around the victim, but the battery life is limited, and the victim can notice something is wrong with the iPhone, so they use special triggers,” says Costin Raiu, head of Kaspersky‘s Global Research and Analysis Team.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s