logo
Iran's missiles reportedly hacked mid-flight over Israel

Iran's missiles reportedly hacked mid-flight over Israel

Daily Mail​3 days ago

By
Published: Updated:
A tech expert has revealed that his firm may have witnessed an 'exotic new' hack that tricked Iranian missiles into plunging into the Mediterranean Sea during the Iran-Israel war. The war between Iran and Israel, which began in mid-June following a series of Israeli strikes on military, nuclear and civilian positions, saw both nations fire salvos of missiles and drones at each other.
Like many missile systems found across the world, Iranian missiles rely on Global Navigation Satellite System (GNSS) data to find their way to their targets. Sean Gorman, the co-founder and CEO of Zephyr.xys, a tech firm that is working to improve location services on mobile phones, believes that he and his team witnessed a new defensive tactic that involved tricking missiles into flying against their programming. Spoofing normally works by sending a powerful radio signal that is stronger than GNSS signals from satellites, forcing a device to listen to the fake information.
This means that devices believe they are at a false location. Ordinarily, spoofed GNSS data looks, to the device, like it has instantly teleported to another location. But Sean believes that what he and his team have seen is a highly sophisticated version of this meant to mimic the arcing flight paths of missiles and send them to safer locations. Sean said: 'Missiles are guided munitions. They all track latitude and longitude and elevation the same way we navigate in our cars or the same way aeroplanes navigate. You're basically providing that same navigation system in ammunition so that it lands in exactly the right place. Jammers and spoofers have been incredibly effective at preventing guided munition from landing where you where they wanted to land and maybe where you instead getting it to go somewhere else or to fail.'
Sean said that his team began tracking spoofing and jamming practices while volunteering in Ukraine, and found that phones loaded with their software were good at tracking these types of attacks. Following an American government grant to further this research, phones loaded with Zephyr software were sent across the world to places known for their frequent electronic interference attacks. One mobile phone with Zephyr's app made its way to Haifa in northern Israel, which like many cities in the nation, came under fire from Iranian missiles. It was through this mobile phone that Gorman and his team noticed a peculiar signal that different from spoofing and jamming techniques seen in the past.
Sean told MailOnline: 'The phone was in Haifa and the positions that the phones were reporting were off in the ocean. And instead of it being teleported to a fixed location, instead we see this arc. There was a synthetically generated position that went in a curve. It's one measurement from one phone, but it's a new behaviour or pattern that we haven't seen.' He added that while he wasn't 100% sure this was a new 'push spoofer... it's certainly not a pattern that we've seen before in that you know'. This arcing pattern is likely to have been developed to trick the drone into following the fake data. 'If you're teleporting with a big jump and it's fixed, that would be a much different pattern than a guided munition that is on a trajectory. You want that thing to think it's still on the trajectory. It continues on the path that the spoof operator is pushing,' Sean said. 'They don't realise they're being spoofed because they're continuing to go on a trajectory. That would fool a drone.'
While it's not clear from Sean's analysis exactly who perpetrated the hack, the signal is believed to have come from the Middle East. Many nations around the world are developing this kind of technology, Sean said, with the invasion of Ukraine being one of the key crucibles. He said: 'There are lots of countries that have sophisticated technical engineers and specialty within GNSS. And each of those countries are constantly trying to evolve their [rivals'] electronic warfare capabilities. We see this with the Russians and Ukrainians, who are constantly iterating and trying to defeat each other's countermeasures in this kind of cat and mouse game. Countries are investing and trying to provide countermeasures and defeats of those countermeasures so they can still operate in a battle situation like we're seeing in the Middle East.'
But with the increased competition for these types of techniques comes the risk it will be used outside a military context, even in the Iran-Israel war. Last week, Frontline tanker Front Eagle and dark fleet tanker Adalynn collided last week near the Strait of Hormuz. The two oil tankers were brought to a halt, following a fire on the desk of the Front Eagle which was later extinguished. But in the days leading up to the collision, the UK's Maritime Trade Operations issued a warning that 'increasing electronic interference' was being reported in the STrait of Hormuz.
Sean said this event pointed to an increasing willingness for warring parties to use spoofing and jamming techniques that could have wider effects on civilians and commercial routes. 'We're increasingly seeing this happen all over the globe and cause issues with global commerce with supply chains, with aviation. So even outside of the military context, we're seeing this more and more in our daily lives. Jamming and spoofing are both prolific, though we see spoofing less frequently and it's a bit harder to detect than jamming.'
'So while it was interesting to see spoofing activity happening they're both risks to civilian and commercial operations. Collisions could be an issue both from an aviation standpoint, as well as a maritime standpoint', Sean said, adding that the ability to 'detect spoofing will be critical for civilian safety. That'll be a really important area of R&D investment and where what we'll need technological capacity both on a civilian and a defence perspective.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

More than 25% of UK businesses hit by cyber-attack in last year, report finds
More than 25% of UK businesses hit by cyber-attack in last year, report finds

The Guardian

time3 hours ago

  • The Guardian

More than 25% of UK businesses hit by cyber-attack in last year, report finds

More than one in four UK businesses have been the victim of a cyber-attack in the last year and many more risk 'sleepwalking' into such disruption unless they take urgent action, according to a report. About 27% of companies said their building had suffered a cyber-attack in the last 12 months, according to a survey of facilities managers, service providers and consultancies undertaken by the Royal Institution of Chartered Surveyors (Rics) and shared with the Guardian. The figure is up from 16% a year ago. Almost three-quarters (73%) of more than 8,000 business leaders believe that a cybersecurity incident will disrupt their business in the next 12 to 24 months. Rics identified cybersecurity and digital risk as one of the biggest and fastest-growing threats to owners and occupiers of buildings. Marks & Spencer was forced to halt orders on its website for almost seven weeks after a major attack in April, which caused clothing sales to fall by a fifth in the four weeks to 25 May. It lost ground to rivals such as Next, Zara and H&M. As cybercriminals' techniques become more sophisticated, attacks on critical infrastructure and data breaches are becoming more common, Rics said. This is going to be exacerbated by the rising capability of artificial intelligence and the pace of technological change. Rics warned that some buildings may be using dangerously outdated operating systems. It said a building opened in 2013 could conceivably use Windows 7, an operating system that has not received security updates from Microsoft in more than five years. Paul Bagust, the head of property practice at Rics, said: 'Buildings are no longer just bricks and mortar, they have evolved into smart, interconnected digital environments embracing increasingly sophisticated and ever-evolving technologies to enhance occupier experience. 'This has led to increasing data being collected and used to inform decision-making; at the property manager, building user, occupier and owner levels. However, while these technologies bring many benefits, from efficiency gains and reduced negative impacts on the planet, they also create multiple risks and vulnerabilities which can be exploited by those looking to cause disruption.' The report identified operational technology such as building management systems, CCTV networks, Internet of Things devices and access control systems as risk areas. This ranges from automated lighting and heating, and ventilation and air conditioning systems, to advanced security protocols and energy management. Sign up to Business Today Get set for the working day – we'll point you to all the business news and analysis you need every morning after newsletter promotion Bagust added: 'It is inconceivable to imagine a world where technology will not continue to pose a growing risk to a building's operation … Failure to identify these growing digital challenges and incorporate security countermeasures risks businesses sleepwalking into cyber-attacks.'

Germany seeks Israeli partnership on cyberdefence, plans 'cyber dome'
Germany seeks Israeli partnership on cyberdefence, plans 'cyber dome'

Reuters

time20 hours ago

  • Reuters

Germany seeks Israeli partnership on cyberdefence, plans 'cyber dome'

BERLIN, June 29 (Reuters) - Germany is aiming to establish a joint German-Israeli cyber research centre and deepen collaboration between the two countries' intelligence and security agencies, German Interior Minister Alexander Dobrindt said on Sunday. Germany is among Israel's closest allies in Europe, and Berlin has increasingly looked to draw upon Israel's defence expertise as it boosts its military capabilities and contributions to NATO in the face of perceived growing threats from Russia and China. "Military defence alone is not sufficient for this turning point in security. A significant upgrade in civil defence is also essential to strengthen our overall defensive capabilities," Dobrindt said during a visit to Israel, as reported by Germany's Bild newspaper. Dobrindt, who was appointed by new German Chancellor Friedrich Merz last month, arrived in Israel on Saturday. According to the Bild report, Dobrindt outlined a five-point plan aimed at establishing what he called a "Cyber Dome" for Germany, as part of its cyberdefence strategy. Earlier on Sunday, Bavarian Prime Minister Markus Soeder called for the acquisition of 2,000 interceptor missiles to equip Germany with an "Iron Dome" system similar to Israel's short-range missile defence technology.

Major Google warning as hundreds of millions of devices ‘cut off' – leaving your devices exposed to sinister crooks
Major Google warning as hundreds of millions of devices ‘cut off' – leaving your devices exposed to sinister crooks

The Sun

time21 hours ago

  • The Sun

Major Google warning as hundreds of millions of devices ‘cut off' – leaving your devices exposed to sinister crooks

GOOGLE has issued a major warning as hundreds of millions of devices "cut off", leaving them vulnerable to sinister crooks. The tech giant has announced that users with outdated software will no longer be able to access Google Chrome. 1 Anyone using an Android device running below version 10.0 will lose access to the site starting this August. Millions of users still rely on outdated software due to limited manufacturer updates, abandoned devices from carriers, and other factors. Still, these devices can't keep up with today's technology. It follows Google's move in 2023, when it ended support for devices running Android 7.0 Nougat, introduced in 2016. The announcement comes as the tech giant prepares to launch Chrome 139, expected in the first 7 to 10 days of the month. The biggest impact for users of outdated Android versions is missing out on vital security updates. Users with Android versions below 10.0 should try to upgrade to continue using Google Chrome. If an upgrade isn't possible, replacing the outdated device is the best option. Otherwise, your device could be left exposed to cybercriminals while browsing the web. Google said in a support document: "Chrome 138 is the last version of Chrome that will support Android 8.0 (Oreo) and Android 9.0 (Pie). "You'll need to ensure your device is running Android 10.0 or later to continue receiving future Chrome releases. "Older versions of Chrome will continue to work, but there will be no further updates released for users on these operating systems." It comes after the tech giant issued an alert to anyone who uses the browser on their PC. A concerning bug has been found on the popular app which could lead to hijacking of your device. The bug has been given a "zero-day" mark which indicates that the vulnerability is being actively used by hackers in the wild. Google has acted swiftly to address the issue and has now patched the browser to prevent it from any further attacks. Google said: "Google is aware of reports that an exploit for CVE-2025-4664 exists in the wild. "The Stable channel has been updated to 136.0.7103.113/.114 for Windows, Mac and 136.0.7103.113 for Linux which will roll out over the coming days/weeks." However, the fix will only work after it has been downloaded and installed on your browser. Vsevolod Kokorin, a security researcher at Solidlab, was the first to discover this most recent Chrome issue and confirmed that it may result in an account takeover by cybercriminals. It is now crucial to make sure you are using the most recent version of Chrome if you use it as your primary web browser. To accomplish this, just select "About Chrome" after clicking on the Chrome in the toolbar.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store