{"id":99984,"date":"2024-12-17T12:50:57","date_gmt":"2024-12-17T04:50:57","guid":{"rendered":"https:\/\/version-2.com\/?p=99984"},"modified":"2024-12-10T12:53:31","modified_gmt":"2024-12-10T04:53:31","slug":"cybercrime-takes-flight-the-case-of-the-dual-drone-hack","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/12\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/","title":{"rendered":"Cybercrime Takes Flight: The Case of the Dual-Drone Hack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"99984\" class=\"elementor elementor-99984\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png\" width=\"1200\" height=\"798\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p>For a while, it seemed like drones were everywhere \u2013 you couldn\u2019t spend a day at a park or go to an outdoor event without hearing the familiar whir of propellors starting up and buzzing over the crowd. Cool concert footage not withstanding, drone operators have often faced some contention with their right to fly, particularly with some notable incidents like the time <a href=\"https:\/\/abc11.com\/bike-race-drone-crash-california\/1971533\/\">a drone crashed into a bike race<\/a>, causing one cyclist to crash (thankfully with only minor injuries,) or the time a drone operator <a href=\"https:\/\/www.latimes.com\/local\/lanow\/la-me-ln-drone-pilot-lapd-conviction-20151118-story.html\">buzzed a police helicopter<\/a> during a manhunt.<span class=\"Apple-converted-space\">\u00a0 <\/span>Then the <a href=\"https:\/\/www.faa.gov\/uas\">FAA stepped in<\/a>, and there was less danger of a drone colliding with a <a href=\"https:\/\/www.businessinsider.com\/faa-us-airways-jet-nearly-collided-with-drone-2014-5\">commercial airliner<\/a>.<span class=\"Apple-converted-space\">\u00a0 <\/span>However, there are still concerns about drones just <a href=\"http:\/\/www.seattletimes.com\/seattle-news\/crime\/woman-knocked-unconscious-by-falling-drone-during-seattles-pride-parade\/\">falling from the sky and knocking you unconscious<\/a>.<\/p><p>Despite all the concerns that led to regulations on where and how to fly drones, one thing that was not addressed was the concerns about drone security. Not the drones themselves being hacked\u2014although that is actually <a href=\"https:\/\/usa.kaspersky.com\/resource-center\/threats\/can-drones-be-hacked?srsltid=AfmBOoo_Pk8MqC5pwIkqUt4FqHoeU-RZwjw9mtj_nBCPggtjq-SHXRrS\">upsettingly easy<\/a>\u2014but about using them to infiltrate networks. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p><b><br \/>Enter the threat from above<\/b><\/p><p class=\"nitro-offscreen\">As reported in <a href=\"https:\/\/www.theregister.com\/2022\/10\/12\/drone-roof-attack\/\">The Register<\/a>, it started with unusual activity on an internally hosted confluence page. When security personnel spotted this, they traced it to a MAC address on their corporate WiFi\u2026.that happened to match one logged in on a network several miles away. After verifying that the user was, in fact, working from home, they used a WiFi signal tracer to follow the signal this device was attached to\u2026.and it led them to the roof.<\/p><p class=\"nitro-offscreen\">There, much to their surprise, they discovered a pair of drones.<\/p><p class=\"nitro-offscreen\">One of them had a <a href=\"https:\/\/shop.hak5.org\/products\/wifi-pineapple?srsltid=AfmBOoqU-9xDqn4oAWbCMeA-CSwkyQdWsAGa5IOKxRWcZetdxVaXYgBh\">WiFi Pineapple<\/a>.<span class=\"Apple-converted-space\">\u00a0 <\/span>Unlike the delicious fruit, this is a device used by security testers to test WiFi networks for weak spots.<span class=\"Apple-converted-space\">\u00a0 <\/span>Unfortunately, it\u2019s also very useful to hackers who want to use it as a <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/rogue-access-point-attack\/\">rogue access point<\/a>.<span class=\"Apple-converted-space\">\u00a0 <\/span>Apparently, this particular drone had made a prior visit, during which it discovered a temporary, less-than-secure Wifi network that it was able to snoop on to get an employee\u2019s credentials and MAC address.<span class=\"Apple-converted-space\">\u00a0 <\/span>Then, a couple of days later, it came back with a friend that had almost $15,000 of spying and hacking equipment with it \u2013 including a Raspberry Pi, a 4G modem, a laptop, and several extra battery packs.<span class=\"Apple-converted-space\">\u00a0 <\/span>The credentials the first drone had stolen a few days earlier were hard-coded into all of these tools. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p class=\"nitro-offscreen\">Thanks to their exceptionally vigilant security team, the attackers did not get much, including their drones back.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p class=\"nitro-offscreen\"><b>Are the drones coming for all of us?<\/b><\/p><p class=\"nitro-offscreen\">Realistically, probably not\u2026.this wasn\u2019t a cheap endeavor, nor was it simple to plan and execute.<span class=\"Apple-converted-space\">\u00a0 <\/span>All told, the hackers spent a lot of money and put a lot of time and effort into this operation.<span class=\"Apple-converted-space\">\u00a0 <\/span>With the amount of customization, research, and lucky timing, it\u2019s unlikely that this could be easily replicated.<span class=\"Apple-converted-space\">\u00a0 <\/span>The fact that the target of this hack was an unnamed financial institution suggests that it was only worth it to the hackers for the potential of an exceptionally large payout. Of course, this isn\u2019t to say it couldn\u2019t happen, but it\u2019s not likely that armies of drones will be filling the skies to perch on the roof of your building and spoof your WifFi network any time soon.<\/p><p class=\"nitro-offscreen\">What you SHOULD be worried about is that hackers rarely have to go to this much trouble to breach your network. When you look at other high-profile breaches like <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/unpacking-the-okta-data-breach\/\">Okta<\/a> and <a href=\"https:\/\/www.portnox.com\/blog\/network-security\/nac-and-the-cisco-hack\/\">Cisco<\/a>, the hackers simply had to gain access to an employee\u2019s Gmail account. When <a href=\"https:\/\/www.securityinfowatch.com\/retail\/article\/53098895\/the-target-breach-10-years-later\">Target<\/a> was breached in 2013, it was via malware installed on an HVAC contractor\u2019s laptop (not even an actual Target employee!). The sad truth is, with <a href=\"https:\/\/www.varonis.com\/blog\/data-breach-statistics\">81% of all data breaches <\/a>caused by stolen, weak, or re-used passwords, hackers don\u2019t have to put that much effort into getting access to your network. <span class=\"Apple-converted-space\">\u00a0<\/span><\/p><p class=\"nitro-offscreen\">The lesson here is not that this happened, but that good security will protect you no matter where the threat comes from. Thanks to the vigilant efforts of the security team who noticed the odd activity right away, it didn\u2019t happen \u2013 ultimately, the hackers didn\u2019t really get anything of value.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>For a while, it seemed like drones were everywhere \u2013 yo [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1273,61],"tags":[352,423,1272],"class_list":["post-99984","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1273","category-press-release","tag-network","tag-portnox","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime Takes Flight: The Case of the Dual-Drone Hack - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime Takes Flight: The Case of the Dual-Drone Hack - Version 2\" \/>\n<meta property=\"og:description\" content=\"For a while, it seemed like drones were everywhere \u2013 yo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-17T04:50:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Cybercrime Takes Flight: The Case of the Dual-Drone Hack\",\"datePublished\":\"2024-12-17T04:50:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-d6e9044\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Drone.png\",\"keywords\":[\"Network\",\"Portnox\",\"2024\"],\"articleSection\":[\"Portnox\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/\",\"name\":\"Cybercrime Takes Flight: The Case of the Dual-Drone Hack - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-d6e9044\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Drone.png\",\"datePublished\":\"2024-12-17T04:50:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-d6e9044\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Drone.png\",\"contentUrl\":\"https:\\\/\\\/cdn-ilccoen.nitrocdn.com\\\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\\\/assets\\\/images\\\/optimized\\\/rev-d6e9044\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Drone.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime Takes Flight: The Case of the Dual-Drone Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime Takes Flight: The Case of the Dual-Drone Hack - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/","og_locale":"zh_HK","og_type":"article","og_title":"Cybercrime Takes Flight: The Case of the Dual-Drone Hack - Version 2","og_description":"For a while, it seemed like drones were everywhere \u2013 yo [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/","og_site_name":"Version 2","article_published_time":"2024-12-17T04:50:57+00:00","og_image":[{"url":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/12\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Cybercrime Takes Flight: The Case of the Dual-Drone Hack","datePublished":"2024-12-17T04:50:57+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/12\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/"},"wordCount":714,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png","keywords":["Network","Portnox","2024"],"articleSection":["Portnox","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/12\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/","name":"Cybercrime Takes Flight: The Case of the Dual-Drone Hack - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png","datePublished":"2024-12-17T04:50:57+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#primaryimage","url":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png","contentUrl":"https:\/\/cdn-ilccoen.nitrocdn.com\/eoFSpsdoQSBMMDlorhbEswoBOvxnAOPL\/assets\/images\/optimized\/rev-d6e9044\/www.portnox.com\/wp-content\/uploads\/2024\/11\/Drone.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/cybercrime-takes-flight-the-case-of-the-dual-drone-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Cybercrime Takes Flight: The Case of the Dual-Drone Hack"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-q0E","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/99984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=99984"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/99984\/revisions"}],"predecessor-version":[{"id":99991,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/99984\/revisions\/99991"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=99984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=99984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=99984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}