Saturday 8 October 2011

Malware Hits U.S. Military Drone Fleet

From a report by Noah Shachtman, Wired, October 7, 2011


"A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.
“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the key logger, and then transmitted over the public internet to someone outside the military chain of command."


TRMG observes that this report, if accurate, highlights the Achilles heel of robotics, both military and civilian - communications network interdiction and infection.  With the Pentagon reportedly setting targets to have robotic vehicles undertake 25% of missions within 20 years, the issue of cyber security and the entanglement of public and private infrastructure will become ever more critical.


Today's key logging infection is a precursor to tomorrow's potential Stuxnet attack.

No comments:

Post a Comment