A new report from the University of Canberra, in partnership with Cisco and DroneShield, warns that the rapid proliferation of advanced drone technology presents a significant and underappreciated cyber threat to Critical Infrastructure (CI). Published on January 21, 2026, the study argues that drones are no longer just a physical threat but have evolved into capable platforms for launching sophisticated, close-proximity cyberattacks. The research identifies urgent defensive gaps in sectors like data centers and telecommunications, where drones could be used to intercept wireless communications, inject malicious data, or exploit physical security vulnerabilities to gain network access. The report urges CI operators to move beyond viewing drones as a nascent threat and to begin actively integrating drone-enabled cyberattack scenarios into their risk assessments and security programs.
The core finding of the report is that the convergence of drone technology with cyberattack techniques creates a new and potent threat vector. Adversaries can use commercially available or modified drones to overcome physical barriers and get in close proximity to sensitive targets that would otherwise be inaccessible.
Potential drone-enabled attack scenarios include:
The report emphasizes that the technology to perform these attacks is no longer theoretical; it is readily available. There is a significant gap between this reality and the current perception of risk among many CI operators, who may still view drones primarily as a physical surveillance or nuisance threat.
The threat combines physical intrusion with electronic warfare and traditional cyberattack methods. The drone acts as the delivery mechanism for the cyber payload.
While ATT&CK does not have a specific 'drone' tactic, the actions performed by the drone map to existing techniques:
T1598 - Phishing for Information: A drone spoofing a Wi-Fi network is a form of phishing.T1040 - Network Sniffing: Intercepting wireless traffic.T1557 - Man-in-the-Middle: Creating an evil twin access point.T1200 - Hardware Additions: Dropping a malicious USB or physically connecting a device.T1595 - Active Scanning: Using a drone to scan for open networks or vulnerable devices.A successful drone-enabled cyberattack could have severe consequences for critical infrastructure:
Detecting this threat requires a combination of physical and cybersecurity monitoring.
| Type | Value | Description |
|---|---|---|
| Other | Unauthorized drone activity | Detection of drones in or near the facility's airspace using RF sensors, radar, or optical cameras. |
| Network Traffic Pattern | Rogue access points | The appearance of a new Wi-Fi access point with a similar or identical SSID to a legitimate corporate network. |
| Log Source | Wireless Intrusion Detection System (WIDS) logs | Alerts from a WIDS for deauthentication attacks, evil twin APs, or other wireless anomalies. |
| Log Source | Physical access logs | Unexplained network activity originating from a physically insecure area, such as a rooftop or utility closet. |
Deploy Wireless Intrusion Prevention Systems (WIPS) to detect and block rogue access points and other wireless attacks.
Implement Network Access Control (NAC) to prevent unauthorized devices from connecting to the network.
Physically secure all network ports and infrastructure, including those on rooftops or in other external areas.
Train employees to recognize and report suspicious drone activity and not to plug in found USB devices.
To counter drone-based wireless attacks, Network Traffic Analysis must be specifically applied to the radio frequency (RF) spectrum. Organizations with critical infrastructure should deploy Wireless Intrusion Detection and Prevention Systems (WIDS/WIPS). These systems continuously monitor the Wi-Fi frequencies (2.4GHz, 5GHz, etc.) to baseline legitimate traffic and detect anomalies. For a drone attack, this would involve detecting a sudden spike in deauthentication packets (indicating an attempt to disconnect clients from the real network), or the appearance of a new access point with a spoofed corporate SSID (an 'evil twin' attack). The WIPS can be configured to automatically send alerts and even launch countermeasures, such as sending spoofed packets to disconnect clients from the rogue AP, thereby neutralizing the drone's attack payload in real-time.
Platform Hardening is essential to reduce the attack surface available to a drone. This involves both physical and logical hardening. Physically, all network ports on the exterior of buildings, on rooftops, or in any semi-public area must be disabled or secured within locked enclosures. Logically, all wireless networks must be hardened. This means disabling outdated and insecure protocols like WEP and WPA, and enforcing WPA3 with strong, unique pre-shared keys or, preferably, 802.1X authentication which requires each user/device to have unique credentials. Furthermore, 'client isolation' should be enabled on guest Wi-Fi networks to prevent wireless clients from communicating with each other. These hardening steps ensure that even if a drone gets within range, it has no vulnerable ports to plug into and no weak wireless protocols to exploit.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats