The virus fell into the control system of American drones


    The attack was carried out by the system of the US Air Force Creek base in Nevada, the American magazine Wired reports citing its own sources . It is from this base that they control drones such as Predator and Reaper, which participate in hostilities in many countries of the world, including Iraq and Afghanistan.

    The virus was discovered about two weeks ago thanks to the Host Based Security System, which did not prevent pilots from continuing to control drones. However, there were no confirmed cases of leakage of classified information. However, it has not yet been possible to completely neutralize the virus. This infection once again underlines the ongoing security problems in one of the most important systems for the US Army.

    So in the summer of 2009, American troops found on the laptops of Iraqi rebels software that allows you to intercept video from drones, which was transmitted to command posts via unencrypted communication channels. Military network security experts are not sure how the keylogger got into the system, and whether this is an accident or a targeted attack by hackers. Despite their widespread use, many drones transmit unencrypted video to command posts, so in the summer of 2009, US forces found on the laptops of Iraqi rebels software that allowed them to intercept video.

    It is noted that the virus spreads through removable hard drives used to download map updates and transfer video operations from one computer to another. Instructions for removing malware from the Kaspersky Lab website were used to treat the virus, however, this did not help. As a result, BCWipe utility was used, which completely deleted information from the media.

    The Air Force declined to comment, only stating, “We don’t discuss the details of vulnerabilities, threats, or attacks on our computer networks at all, as this makes it easier for attackers.”

    Also popular now: