Check Point Researchers developed an attack to hijack DJI drone user accounts that may contain the user’s sensitive information as well as access to the device itself.
Researchers developed an XSS attack that could be posted on a DJI forum that is used by hundreds of thousands of DJI customers, to intercept the identifying token and use it to log in as the customer, according to a Nov. 11 blog post.
The attack demonstrates the vulnerability in the drone’s cloud network which can be accessed from anywhere by highlighting the need for a two-factor authentication mechanism, better identification mechanisms, and the importance of segmentation for organizations across their IT networks in order to contain and limit the damage inflicted by a potential attack.
The attacker enters the web forum, steals the cookie ID and login, then either uses the stolen information to either bypass SeNeo Mobile protection to access a DJI mobile app or to access the full DJI Flight Hub.
Once this is done, the threat actor has access to the drone’s flight records, photos taken during flight, payment details, real-time access to the drones camera, , and a live view of the drone pilot’s camera and location. Due to a loophole in DJI’s customer identification process, researchers were able to hijack a user’s account and take complete control over any one of the cloud-based platforms and the data stored there.
DJI drones are used in several industries ranging from critical infrastructure, manufacturing, agricultural, construction, emergency-management, government agencies, military and other sectors meaning an attacker could potentially gain access to crucial information.
Researchers noted that data provided by the drones could offer valuable reconnaissance information in the form of flight paths, photos, aerial video footage and maps. Those looking to target critical infrastructure could gain access to intricate details and images from facilities such as energy plants or water dams.
Attackers targeting delivery and logistics companies could gain insight to routes and may gain insight into which packages are being delivered where and to whom in order to intercept them.
DJI was informed of the vulnerability in March 2018 and the vulnerability has since been patched.