Researcher reveals how hackers attack the US F-35 Fighter Jet
Researchers recently revealed that hackers may use two external programs to attack the top US fighter F-35. The two programs are the Autonomic Logistics Information System (ALIS) and Joint Reprogramming Enterprise (JRE). Two off-board programs provide logistics, planning, maintenance, training and support services for the F-35.
“Fighter jets in training”by North Charleston is licensed under CC BY-SA 2.0
The worldwide fleet of F-35 will connect to these programs through the central connection point, and then connect to the Lockheed Martin server. The ALIS server is used to track aircraft conditions and spare parts, while the JRE is responsible for sensors and weapon systems on the F-35 and automatically shares radar information and other digital information related to electronic warfare signals.
Experts said that this information will help the F-35 pilots understand the combat indicators, location, and develop an attack strategy. By attacking the ALIS and JRE systems, hackers can provide erroneous data when the pilot performs a task, thereby disrupting the action.
In addition to ALIS or JRE, hackers can also attack the F-35 simulator to steal confidential information. The author summarizes the measures to strengthen the network security of the F-35 fighter, including timely software updates, timely patching of vulnerabilities, use of honeypots, and deletion of useless data in the database.
Via: gbhackers