Researchers at cybersecurity firm Resecurity detected a rise in cyberattacks targeting UAV and counter-UAV technologies.
Resecurity identified an increase in malicious cyber activity targeting UAV and counter-UAV (C-UAV/C-UAS) technologies. That was especially notable during active periods of local conflicts, including the escalation of the Russia-Ukraine war and the Israel-Hamas confrontation. The trend of malicious targeting in the drone manufacturing segment increased during Q3-Q4 2024 and continued into Q1 2025.
Unmanned Aerial Vehicles (UAVs), commonly known as drones, have become integral to modern military operations, particularly for intelligence, surveillance, and reconnaissance (ISR) missions. As their use has expanded, so has the focus on counter-UAV (C-UAV) technologies designed to detect and neutralize these aerial threats. Cybercriminal groups, mercenaries and foreign nation-state actors express a significant interest in these technologies.
Resecurity observed an increased interest in specialists involved in science and technology (S&T) and drone engineering by foreign actors, which enables them to pivot from cyber to traditional industrial espionage.
“Multiple postings on the Dark Web by actors looking to acquire sensitive military and intellectual property (IP) documents related to drones. Such tactics enable foreign actors to optimize their efforts and blur attribution, operating under the guise of cybercriminals.” reads the report published by Resecurity.
In several incidents investigated by experts, the actors were more interested in actual buyers of UAV and counter-UAV technologies rather than the specifics of the technology involved, which likely is the reconnaissance for future cyber threats against buyers of these technologies, including Human Intelligence (HUMINT) efforts concentrated on specific areas of interest relevant to the defense industrial base (DIB) workflow.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, UAV)