MQ-9 Reaper Drone documents are being sold on dark web

Drone documents of Usa air force are being sold on dark web
MQ-9 Reaper Drone documents are being sold on dark web

Independent analysts find out they have discovered a hacker trying to sell files relating to a U.S military MQ-9 Reaper drone on the dark webSpeaking to The Hill, the research firm Recorded Future ( says it is “100 percent certain” that the documents relating to the sale are 100% authentic.

Read More: New Russian Submarine to Merge With Ocean

Recorded Future’s Insikt Group, “a team of veteran threat researchers that back up the intelligence analysts, engineers, and data scientists” at RF, found an English-speaking hacker who claimed to have access to documents relating to the MQ-9 Reaper unmanned aerial vehicle (UAV). The MQ-9 is one of the Air Force’s most prominent drones, playing a large role in Iraq and other fields of combat like Yemen. The Air Force hopes to keep the MQ-9 in service through the 2030s.

The original ad for drone documents.
The original ad for drone documents.

Insikt Group made direct contact with the hacker, who responded to them. Over a period of weeks, the group was able to discern that the hacker, who remains anonymous, was able to hack a computer of the 432d Aircraft Maintenance Squadron’s Reaper Aircraft Maintenance Unit Officer In Charge (AMU OIC). Known as the 432nd Wing, the unit was the first in the military dedicated entirely to UAV operations. They’re based out of Creech Air Force Base in southern Nevada.

Read More: The advanced attack submarine the U.S. Navy never built

The hacker used the Shodan search engine, which can let users find specific types of computers around the globe, to find a weakness in the 432nd. After searching the globe for misconfigured routers that use a standard port 21, the hacker found the computer in Nevada.

The captain whose computer was hacked, Inskip notes, had recently completed a Cyber Awareness Challenge. Yet he did not set his computer’s FTP password, which allowed files like Reaper maintenance course books and the list of airmen assigned to Reaper AMU to slide easily into the hacker’s hands. This was, in Inskit’s words, a “rudimentary attack.”

The files aren’t classified, but they are generally only available to U.S. government agencies and their private contractors.

RF reached out to the Department of Homeland Security about the breach, the agency confirmed to The Hill. The Air Force is “aware of the reporting and there is an investigation into the incident.”

The military is a consistent target of hacking. Last year, U.S soldiers suddenly had their smartphone geolocation tools turned on without their consent. This action, it later turned out, was triggered by somebody in Moscow.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.