• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Skynet? Virus hits US Predator & Reaper Drone fleet

SunnyD

Belgian Waffler
Um... holy shit?

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the US military’s most important weapons system.

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”

Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.

...
 
Between this and Stuxnet there's some scary ass virii running around out there.
 
70540916v2_240x240_Front.jpg
 
Probably just a run of the mill virus that got loaded accidently through a USB drive or something. I doubt it was targeted at the drones.

Stuxnet on the other hand is a scary piece of work.
 
Probably just a run of the mill virus that got loaded accidently through a USB drive or something. I doubt it was targeted at the drones.

Stuxnet on the other hand is a scary piece of work.

If it was a run of the mill virus, how come it keeps coming back (a la rootkit) and our country's experts have literally no idea what it's purpose is?

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”
 
If it was a run of the mill virus, how come it keeps coming back (a la rootkit) and our country's experts have literally no idea what it's purpose is?
government experts is some sort of oxymoron

case in point, why are they individually running commands (from the internet) to eliminate the virus instead of reimaging the machines?
 
Last edited:
hacked information from preds:
-turning left
-more thrust
-fire missile
-more thrusting
...

zzzzzzz
 
In late 2008, for example, the drives helped introduce the agent.btz worm to hundreds of thousands of Defense Department computers. The Pentagon is still disinfecting machines, three years later.

Wow! They still haven't finished cleaning up a three year old infection.
 
hacked information from preds:
-turning left
-more thrust
-fire missile
-more thrusting
...

zzzzzzz

If you think that's all the information the predator processes, I've got bad news for you...

<--- works on gov't contract UAV systems.
 
Possibly not a virus at all, but a bit of debugging info and other developers haven't figured out if it was put there intentionally.
 
If it was a run of the mill virus, how come it keeps coming back (a la rootkit) and our country's experts have literally no idea what it's purpose is?

There's lots of ways to hide code and obvuscate code that they do know about. Ever try stepping through a clever virus in a debugger? It gets complicated fast when they're doing stuff like bit shifting and executing stuff that looked like data at load time.
 
Back
Top