You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: We place “image malware” on the drone. It can infect the pilot’s device if he either pulls images mid-flight or if the droneis returned to/retrieved by the pilot for one of a number of reasons:
The pilot aborts the mission for an unknown reason.
We’ve called Return to Home through one of our programs.
The pilot notices our attempts to take control (unlikely) and calls the mission off using manual flight mode.
The drone has crashed (by reason of pilot or us).
The pilot eventually retrieves contents from the DCIM, or transfers images to his wireless device mid-flight, and our image malware infects his machine and broadcasts data to lead to his location.
Possible Execution Methods:
Masked file extension (cat.jpg.exe)
EXIF/metadata exploits affecting specific programs (Windows Photo Viewer, etc.)
Description: We place “image malware” on the drone. It can infect the pilot’s device if he either pulls images mid-flight or if the droneis returned to/retrieved by the pilot for one of a number of reasons:
The pilot eventually retrieves contents from the DCIM, or transfers images to his wireless device mid-flight, and our image malware infects his machine and broadcasts data to lead to his location.
Possible Execution Methods:
The text was updated successfully, but these errors were encountered: