Police Drones Can Be Hijacked From a Mile Away
One enterprising expert found a way to hack a very expensive drone from more than a mile away, at minimal cost.
Even in 2016, we still haven't learned our lesson: Encrypt everything. If your device transmits information over a radio connection, it needs to be encrypted. Period.
Otherwise, some enterprising hacker will find a way to manipulate it — or, if you're lucky, a security researcher. One enterprising expert recently found a way to hack a very expensive drone from more than a mile away, at minimal cost.
The ingenious idea comes courtesy of Nils Rodday, an IBM security researcher based in Germany, who gave a presentation today (April 1) at the Black Hat Asia conference in Singapore. Rodday shared his presentation on the Black Hat website, while The Register covered his talk and provided additional details. The hack targets professional-grade drones, often used by police and security forces, that tend to cost about $30,000 apiece.
MORE: Best Drones
Without getting too far into the weeds, here's how the hack works. The specific model tested — Rodday would not name the manufacturer, but there are several with similar setups — uses a long-range Xbee chip to transmit radio signals between the drone and the Android tablet controlling it.
Because Android tablets don't have Xbee chips themselves, there's an intermediary relay box that talks to the tablet via Wi-Fi, and to the drone via Xbee. (The box is mounted on a short-range regular RC hand-held controller that plays no part in the hack.)
The Xbee chip is not quite powerful enough to support encryption without a performance hit, and the Wi-Fi chip uses WEP encryption. WEP is not a terribly secure protocol; there's a reason why most Wi-Fi networks have switched over to WPA.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
Using about $40 worth of kit, Rodday figured out two ways to intercept and redirect a drone's signal. The first to hijack the Wi-Fi signal, which was easy. Free software tools can crack WEP in seconds, and researchers have been demonstrating Wi-Fi based drone hijacks for a couple of years.
What's new is the Xbee hack. Rodday reverse-engineered the proprietary Xbee-based protocol, then transmitted his own signals with his $40 kit. An attacker with an Xbee radio chip of his or her own could use this method hijack the connection and start sending their own commands to the drone. An experienced handler could fly the drone right into his or her own hands, while a more brutish attacker may just disable the engines while it's flying high.
Of course, hackers could also just his first method to take control of a drone by disrupting the Wi-Fi connection between the controlling Android tablet and the vehicle. But Rodday pointed out that they would have to be within 100 meters of the controller and its relay box, whereas an Xbee attack could take place from anywhere within a 1.2-mile radius.
As is usually the case with security research, there's no evidence that anyone has ever tried this in the wild. Furthermore, drone manufacturers are already trying to find solutions to their Xbee woes. However, a lack of encryption is a limitation of the chip, not a software or firmware issue. There may not be much they can do, short of manufacturing new drones equipped with more powerful chips that would eat into battery life.
Xbee chips are present in a variety of consumer drones, although Rodday did not test whether he could hijack them all. Presumably, a hack that works on a $30,000 drone would work on a $1,000 counterpart, but if you want to try, perhaps it's better to test it on your own drone than a friend's.
Readers who want more technical details might like to read Rodday's master's thesis, available here as an English-language PDF.
Marshall Honorof is a senior editor for Tom's Guide, overseeing the site's coverage of gaming hardware and software. He comes from a science writing background, having studied paleomammalogy, biological anthropology, and the history of science and technology. After hours, you can find him practicing taekwondo or doing deep dives on classic sci-fi.