Hacker Demonstrates Android Smartphone App To Hijack A Plane Midair

hijack a planeOn your next flight, you may want to look over your shoulder at what the person next to you is doing. Help Net Security reports:

An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, galvanized the crowd attending the Hack In The Box Conference in Amsterdam. Teso showcased an Andorid app, PlaneSploit, that remotely controls airplanes on the move.

Teso has been working in IT for the last eleven years and has been a trained commercial pilot for a year longer than that. By creating an exploit framework (SIMON) and an Android app (PlaneSploit) that delivers attack messages to the airplanes’ Flight Management Systems (computer unit + control display unit), he demonstrated the terrifying ability to take complete control of aircraft.

His testing laboratory consists of a series of software and hardware products. But the connection and communication methods, as well as ways of exploitation, are absolutely the same as they would be in an actual real-world scenario. Since it’s nearly impossible to detect the framework once deployed on the Flight Management System, there is no need to disguise it like a rootkit.

Teso says that he was pleasantly surprised by the reaction of the industry to his research and discoveries, as the companies didn’t try to deny the existence of the problems and have vowed to aid him in his research.

8 Comments on "Hacker Demonstrates Android Smartphone App To Hijack A Plane Midair"

  1. Rhoid Rager | Apr 15, 2013 at 12:26 pm |

    First prototype put into action 9/11/01

  2. my theories on this tech always tended towards the fantastic or fanciful. achieving non-polynomial (or higher) computation for quantum bit injections into otherwise antiquated processor technology. here, literally, on-the-fly doping. god i watch way too notenoughmuch Stargate :0

    • Calypso_1 | Apr 15, 2013 at 4:06 pm |

      How would you consider injecting them? RF induced electron-phonon coupling; some type of active side-channel attack?

      • side-channel attack just send me to stigmata (doink), but phonons are gorgeous. in the words of mr. universe: “you can’t stop the signal, Mal”. short of massive # iterations concerning electronic harmonics, e.g. modeling every possible combination of atomic phonons, or a solved quantum system otherwise (really vague :/) i’d say that these planes probably don’t have much in the way of e.m. shielding for microwave frequencies, x-rays, etc. so there’s the ‘shield penatrator’, which means i currently lack the requirements to experiment on heuristics for the phonons, so i’m DITW/A/S/G/W/E

    • Spasmodius | Apr 16, 2013 at 5:21 am |

      In my day all you had to do was modulate an inverse tachyon pulse through the main shields. Seemed to work in a wide variety of disparate events!

      • that i usually associated with teleportating. same computational basis – have to figure out what’s at the receiving end and send that data to the teleporter (i.e. inverse; and the matter transfer itself is tachyon, kind irregardless of the data transport atm). after all, wouldn’t want to teleport into a midshipmen >..<

  3. Chaos_Dynamics | Apr 15, 2013 at 1:24 pm |

    The Lone Gunmen Pilot Episode March 04, 2001.

    The pilot episode depicted a remotely controlled plane being flown into the New York World Trade Center; it originally aired six months before 9/11.

    Foreshadowing a number of conspiracy theories which would arise in the wake of the September 11, 2001 attacks, the plot of the March 4, 2001 episode depicts a secret faction within the US government plotting to hijack a Boeing 727 and fly it into the World Trade Center by remote control. The stated motive was to increase the military defense budget by blaming the attack on foreign interests.

    In the episode, the plot is foiled by the protagonists, Langly, Frohike, and Byers, who board the doomed plane and deactivate the malicious autopilot system just seconds before the plane would have reached the World Trade Center.

  4. BuzzCoastin | Apr 15, 2013 at 8:08 pm |

    > Since it’s nearly impossible to detect the framework once deployed on the Flight Management System, there is no need to disguise it like a rootkit.

    This is exactly the way
    the corporate elites highjacked the government .

Comments are closed.