Security News > 2023 > May > Drone goggles maker claims ‘ransomware’ attack after firmware sabotage
Orqa, a maker of First Person View drone racing goggles, claims that a contractor introduced code into its devices' firmware that acted as a time bomb designed to brick them.
On early Saturday, Orqa started receiving reports from customers surprised to see their FPV.One V1 goggles enter bootloader mode and become unusable.
The company revealed hours after devices began getting bricked when powered up, the issue resulted from a firmware bug "Caused by the date/time feature."
Orqa says the contractor behind the so-called "Ransomware time-bomb attack" has allegedly posted an "Unauthorised binary file" that should purportedly address the bug bricking FPV.One goggles since Saturday morning.
"Since the perpetrator has gone public with what he did and posted what we fear is another compromised piece of firmware, we decided it is in our users' interest to be made aware of the situation and warned about the risks of installing a likely compromised firmware on their devices."
The fixed firmware is expected to be available until the end of the day after the new version is deemed safe for public release.
News URL
Related news
- Massive PSAUX ransomware attack targets 22,000 CyberPanel instances (source)
- North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- City of Columbus: Data of 500,000 stolen in July ransomware attack (source)
- Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Halliburton reports $35 million loss after ransomware attack (source)
- New Ymir ransomware partners with RustyStealer in attacks (source)
- New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks (source)
- New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems (source)