It is fortunately the work of a researcher in security, Rahul Sasi for a team of Indian hackers, the Garage4Hackers. After demonstrating the weakness of TV boxes by cable, the hacker is interested in the AR Drone from Parrot, a consumer drone that runs on an embedded Linux. It has thus developed [MALware DRONE], a malware that exploits a software vulnerability in the AR Drone from Parrot to settle on the controller of the drone. Rahul Sasi was able to demonstrate that he could inject its virus in an AR Drone in flight in order to take control, away from the images. Worse for owners of the Parrot drone, this malware does not disappear after reset of the drone.
The safety of objects connected once more in question
Will have to get used to it. The world of connected objects, Internet of objects as it is called now, is and will be populated with products little or not secure. Home routers, multimedia hard drives are real colanders and relay to hackers to launch major attacks denial of service against sites the most used various.
Even a connected refrigerator became the potential target of a malware that will take control the day came. There’s no reason that drones escape the phenomenon as they are more and more frequently equipped with an on-board camera.
In his video, Rahul Sasi showed that it is possible to take control of a drone from the market in a few seconds, and then away from the sensors. What is most reassuring is that the hacker must be in WiFi range of the drone to him injecting his malware. There may be broadcast over the Internet as it is the case of viruses for PC, for example. It is likely that after this announcement, Parrot will correct the flaw exploited by the researcher to place [MALware DRONE] on his drone.
Source : “MalDrone — First Ever Backdoor Malware for Drones”, Hacker News, January 26, 2015