Advertisement

Drudge Retort: The Other Side of the News
Monday, April 14, 2025

The Ukrainian military is teaching the world how to creatively use drones for battlefield offense and defense. Ukraine has built a vast arsenal of drones customized for precision strikes, reconnaissance, and kamikaze missions.

But this innovation also extends to cybersecurity offense and defense.

More

Comments

Admin's note: Participants in this discussion must follow the site's moderation policy. Profanity will be filtered. Abusive conduct is not allowed.

More from the article ...

... Let me tell you a little story first told on X by security researcher Greg Linares.

During the summer of 2022, an East Coast financial services company specializing in private investments became the target of a new kind of cyberattack involving drones. The incident came to light when the company's cybersecurity team detected unusual activity on its internal Atlassian Confluence page. The activity appeared to originate from within the company's network, but the same MAC address was simultaneously being used remotely by an employee working from home.

The security team acted quickly, deploying a Fluke AirCheck Wi-Fi Tester to trace the rogue signal. The investigation led them to the roof of their building, where they discovered two modified drones: a DJI Phantom and a DJI Matrice 600. The Phantom drone was equipped with a Wi-Fi Pineapple device (a tool typically used for penetration testing, but abused here to spoof the company's legitimate network.) This allowed attackers to intercept login credentials when employees unknowingly connected to the fake network. The Matrice drone carried a more extensive payload, including a Raspberry Pi, a GPD mini laptop, a 4G modem, additional Wi-Fi devices, and batteries.

Later, the team discovered that the Phantom drone had been used days earlier for reconnaissance, capturing an employee's credentials and Wi-Fi access without detection. These credentials were then hardcoded into the tools deployed on the Matrice drone. The attackers aimed to exploit these credentials to access the company's internal Confluence page and potentially other resources stored there. ...


#1 | Posted by LampLighter at 2025-04-14 08:26 PM | Reply

When you need physical access...

#2 | Posted by LegallyYourDead at 2025-04-14 09:07 PM | Reply

@#2 ... When you need physical access... ...

Bingo!

The drones provide the nearby physical access that previous security measures were not prepared to properly handle.


#3 | Posted by LampLighter at 2025-04-14 09:21 PM | Reply

The following HTML tags are allowed in comments: a href, b, i, p, br, ul, ol, li and blockquote. Others will be stripped out. Participants in this discussion must follow the site's moderation policy. Profanity will be filtered. Abusive conduct is not allowed.

Anyone can join this site and make comments. To post this comment, you must sign it with your Drudge Retort username. If you can't remember your username or password, use the lost password form to request it.
Username:
Password:

Home | Breaking News | Comments | User Blogs | Stats | Back Page | RSS Feed | RSS Spec | DMCA Compliance | Privacy

Drudge Retort