Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Rise of Skyborne Cyber Threats: A New Frontier of Cyber Espionage



A recent cyberattack on drone manufacturers in Taiwan highlights the growing concern over the use of drones for malicious purposes and the increasing sophistication of cyber threats. The attack, which was uncovered by the Acronis Threat Research Unit (TRU), demonstrates the need for vigilance in detecting and preventing such threats. With the rise of skyborne cyber threats, it is essential to prioritize robust cybersecurity measures, threat intelligence, and international cooperation to stay ahead of emerging threats.

  • Attackers breached drone manufacturers' systems in Taiwan using a sophisticated cyberattack.
  • The attack used enterprise resource planning (ERP) software to gain access to company PCs and installed a persistent backdoor.
  • The attackers exploited vulnerabilities in Digiwin's ERP software and used a dynamic-link library (DLL) sideloading technique to install malware.
  • The incident highlights concerns over the use of drones for military purposes and the need for vigilance in detecting and preventing such threats.
  • Robust cybersecurity measures, threat intelligence, and continuous monitoring are essential to protect systems from sophisticated attacks like this one.
  • Taiwan's strategic location makes it an attractive target for adversaries interested in military espionage or supply chain attacks, emphasizing the need for proactive cybersecurity measures.


  • In a disturbing development that has sent shockwaves through the cybersecurity community, attackers have been identified as having successfully breached the systems of drone manufacturers in Taiwan, leveraging the country's expertise in drone technology to launch a sophisticated cyberattack. The incident, which was uncovered by the Acronis Threat Research Unit (TRU), highlights the growing concern over the use of drones for malicious purposes and the increasing sophistication of cyber threats.

    According to the TRU, the attack began with the attackers gaining access to company PCs within drone manufacturers through enterprise resource planning (ERP) software. The first appearance of the malicious files was inside the folder of a popular Taiwanese ERP software called Digiwin. The attackers replaced Digiwin's original Update.exe execution file with Winword.exe, which caused it to launch Microsoft Word 2010 instead of its intended function. This allowed the attackers to load a backdoor that could carry out malicious actions.

    Investigations into the attack revealed that the attackers used a dynamic-link library (DLL) sideloading technique to install a persistent backdoor on infected systems. They brought three files to the system: a legitimate copy of Microsoft Word 2010, a signed wwlib.dll file, and a file with a random name and extension. The attackers used Microsoft Word to sideload the malicious wwlib DLL, which acts as a loader for the actual payload residing inside an encrypted file.

    Analysis by the TRU suggested that exploitation or supply chain attack originated in Digiwin's ERP software. Some of the software's components contain known vulnerabilities, making it a prime target for attackers. The use of a long-lasting digital certificate from a company based in Taiwan further suggests that this strain of drone attacks is a highly sophisticated, targeted attack with careful planning and execution by threat actors.

    The incident highlights concerns over the increasing use of drones for military purposes and the need for vigilance in detecting and preventing such threats. Drone manufacturers are under scrutiny to ensure their systems are secure from cyber threats, while governments and regulatory bodies must establish clear guidelines and regulations to govern the development and deployment of drone technology.

    The attack also underscores the importance of robust cybersecurity measures and threat intelligence. The Acronis TRU team's research demonstrates the value of continuous monitoring and analysis to identify emerging threats and provide security insights. By staying ahead of such threats, organizations can protect their systems from sophisticated attacks like this one.

    Furthermore, the incident highlights Taiwan's strategic location as a hub for drone technology development. With its strong technological background and allegiance to the U.S., Taiwan has become an attractive target for adversaries interested in military espionage or supply chain attacks. The government of Taiwan must take proactive steps to strengthen cybersecurity measures and prevent such attacks from occurring.

    In conclusion, this incident serves as a stark reminder of the evolving cyber threat landscape, particularly with regards to the increasing use of drones for malicious purposes. Cybersecurity experts, policymakers, and industry leaders must collaborate to address these emerging threats and develop strategies for detection, prevention, and mitigation.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Rise-of-Skyborne-Cyber-Threats-A-New-Frontier-of-Cyber-Espionage-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/look-up-the-new-frontier-of-cyberthreats-is-in-the-sky/


  • Published: Wed Mar 5 12:09:11 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us