This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Flying drone steals smartphone contents

Share this article:

British researchers have tested their invention, the Snoopy drone, over the skies of London.

Flying drone steals smartphone contents
Flying drone steals smartphone contents

Two British security researchers, Glenn Wilkinson and Daniel Cuthbert of SensePost, have built a flying drone - called Snoopy - that can steal the data from anyone below who is using a mobile device connected to an open WiFi network.

Snoopy can be hidden inside someone's pocket on the ground or, in its latest test, installed on-board a drone that flew over London and captured data from around 150 mobile devices in less than an hour. The invention highlights once more the danger of using WiFi hotspots.

Snoopy is a compact tracking, profiling and data-capture device that targets mobiles and the people who own them. SensePost first announced it in 2012 with a proof of concept and have been developing it since then.

Glenn Wilkinson, a security researcher with independent security consultancy SensePost, explained: “Snoopy can run on small computers - Raspberry Pi or BeagleBone - certain smartphones (Nokia N900) or laptops. It's designed to collect information from devices that people carry – smartphones, tablets, Google Glasses, even NFC cards and RFID tags and sync that data back to a server where it can be explored.”

Snoopy works by imitating any free WiFi network that the victim has connected to in the past and then intercepting all the data they send and receive. It can also be used to infect the user's device, either by injecting malicious web traffic or by firing exploits at the device from the Snoopy server.

Numerous drones can be deployed over a wide area, with each device uploading its data to a central server. And Wilkinson said that taking Snoopy airborne was “not just stunt hacking".

He told SCMagazineUK.com via email: “There are several benefits - data collection from a height beyond audible/visual range, very quick collection over a large area, ability to bypass physical security - walls, men with guns, etc – and autonomous searching for known devices.”

Daniel Cuthbert, who is COO at SensePost, described the “completely illegal” part of Snoopy, telling us: “If a network is an open network - and generally most people connect to open free WiFi hotspots - the Snoopy drone pretends to be that network. It connects up and we give you internet access routed through our servers and that's when the full-on interception happens. Everything that's going over your phone to the internet will be routed by our servers.”

Cuthbert gave the example of hijacking Yahoo email. “Yahoo has a terrible security record. This is one of the big internet giants and it still doesn't do enough to make us secure. If you've got personal information coming into your Yahoo account, someone can gain access to it with some drones. It's a waiting game - what information will you get emailed eventually? Could there be credit card information, could there be passwords, or other financial parts of your life? Once you know the username and password to the Yahoo account it's yours.”

WiFi dangers

The drone's development has emphasised the vulnerability of open WiFi hotpots in particular. Wilkinson told us: “The best results we have had so far are around WiFi because of inherent weaknesses in the way WiFi works, and the verbosity of the information that is sent out. The techniques we use aren't new, but the manner in which they are deployed is novel.”

Laura Aylward, senior consultant at Context Information Security, underlined the problems revealed by the device. She told SCMagazineUK.com via email: “There is always a risk that sensitive data is made available from mobile devices over a WiFi network. The use of a drone is just a rather dramatic way of highlighting the risk when users connect to untrusted access points.”

She advised: “It is possible to reduce the amount of sensitive data sent from the phone by ensuring that personal information is only entered into secure sites and enabling SSL for applications where possible. Organisations can also enforce VPNs to further protect sensitive data from mobile devices.”

Cuthbert warned: “In a normal secure environment, the company has an IT security department and there's policies that enforce the security of the device, so you can't just install any software on your mandated Windows operating system or whatever. The problem with the smartphone is that there is no such thing, so if you walk in with a phone that has got a malicious application installed and you connect to your company's internal WiFi network, you've just walked in with a Trojan device.

“I'm still not convinced on Bring Your Own Device – you're effectively taking the old secure network model and breaking it and allowing anyone to come into it. People need to be aware that these free WiFi networks often come with a big risk.”

Wilkinson and Cuthbert are demonstrating Snoopy at the Black Hat Asia cyber security conference in Singapore on 25-28 March.

In a previous test by SensePost in 2012, four people sat unnoticed in different London underground stations with Snoopy drones running for two hours, while Wilkinson sat at King's Cross station for 13 hours collecting data.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...