How did hackers attack the plane?

In the technology world, when someone makes sure that his system is completely secure, on the other hand, someone is trying to figure out that security hole. And this scenario will get even more serious when the job is done on an airplane, as all passengers are at altitudes of more than 9,000 meters and fly at speeds of more than 223 meters per second.

Find out how to attack the plane

Some articles reported about Chris Roberts, an expert in cyber security, claimed to successfully hack into the aircraft's control system only from the passenger seat position and this problem is causing Concerned about the aviation industry.

Basically, many people know that the network in the cockpit area will be completely separate from the entertainment network for passenger areas, and this is completely impossible for any news name. Hackers who want to attack the cockpit system while sitting in the passenger seat position. However, after the success of Roberts, this security issue needs to be reconsidered.

Picture 1 of How did hackers attack the plane?

In the technology world, when someone makes sure that his system is completely secure , on the other hand, someone is trying to figure out that security hole. And this scenario will get even more serious when the job is done on an airplane , as all passengers are at altitudes of more than 9,000 meters and fly at speeds of more than 223 meters per second.

Direct connection

The expert claimed that he had infiltrated the network in the cockpit via a network connection on the plane. Currently many in-flight entertainment systems use USB connectivity and even some aircraft have Wi-Fi networks . And both of these protocols can be exploited by hackers to infiltrate the aircraft's computer system.

However, in theory, even when attacking a network of passenger areas, it is not possible to directly penetrate the pilot's network , because these two networks are designed separately. The FBI and some other agencies also argue that there is no evidence that these two networks are interconnected. But another assumption is that it is possible that this hacker uses a device (or some software) to get information from network systems.

Picture 2 of How did hackers attack the plane?

Although isolated, these two networks on airplanes are still somewhat connected because they share some common information such as speed, flight and weather notifications. By monitoring a network and comparing the information flow being pushed against reality, it is difficult for a hacker to know which signal is from the passenger area or from the cockpit. However. Once considering and comparing the signals of these two networks at the same time, hackers will be able to easily analyze which data comes from.

From there, hackers can copy this information flow and send the same fake information back to control the aircraft. Even when the information is encrypted and isolated separately, theoretically their origin (where the signal originates) can still be found and invaded. This means hackers can identify network systems and organize internal DOS attacks (denial-of-service attacks) that cause the system to clog with full of unnecessary data and prevent The pilot sends control signals to the aircraft system.

Network monitoring

The airline industry needs to review and reevaluate its internal aviation security system , especially for aircraft that provide Wi-Fi services to passengers. They must monitor any "unusual" traffic data against the passenger network and the cockpit system to prevent possible attacks.

Picture 3 of How did hackers attack the plane?

Another way to prevent it is to use two different monitoring systems to track events sent from satellites. When both systems see a problem, the information will be notified to the pilot in order to prevent it in time.

Network engineers have also implemented this approach by looking at network traffic and finding possible causes. Because of the extremely important nature related to aviation safety, more and more people are finding holes and timely fixes that will make the pilot control of the pilots even more secure.

Picture 4 of How did hackers attack the plane?

Any traffic with suspicious signs will be included in the suspect round for detailed investigation. At that time, the aircraft will automatically connect with remote security experts, which will inform them of the pilot that the aircraft is being attacked and will give some advice to respond promptly. .