I still did not see how they did it unless it was intentionally done. The only viruii that are about impossible to remove are either driver level or hidden in the obscure areas of data such as in ntfs alternate data streams.
It wasnt the drones or the controlstations that were infected. It was workstations seperated from the dronecontrols...and it seemed the virus had gotten there from a externally connected harddrive. according to this artikle:
I wish it was so. If THIS got on, how much more difficult would it be for a malicious operator to embed a far more destructive virus, something that created random control inputs, screwed with the datalink, anything. This virus didn't do anything, but that's not assuming future breaches will be so harmless. Cybersecurity is serious stuff.
Check the article again. The "virus" did not infect the actual control computers used to fly the drones. It infected the "ground support" computers, not flight computers.
Quite frankly I was surprised in the original article that they had problems getting rid of it. I worked in a large PC environment and if somebody had gotten their PC infected like this, I would just wipe the drive and re-image. Problem solved.
"The early bird gets the worm but the second mouse gets the cheese."
This has happened before. Some Bozo doesn't follow the rules because for whatever reason they don't apply to him and he uses a home USB thumb drive or other storage device and something jumps from his home system to a "closed" system. Then the rest of us pay in excessive security restrictions, two-person rules, etc...
<b>"It's time to get medieval, I'm goin' in for guns"</b> - <i>Dos Gringos</i>