{"id":27315,"date":"2019-05-15T14:48:42","date_gmt":"2019-05-15T14:48:42","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30154\/Plane-Radio-Navigation-For-Landing-Is-Insecure-And-Can-Be-Hacked.html"},"modified":"2019-05-15T14:48:42","modified_gmt":"2019-05-15T14:48:42","slug":"plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/","title":{"rendered":"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/ILS-spoofing-demo-800x448.jpg\" alt=\"A plane in the researchers' demonstration attack as spoofed ILS signals induce a pilot to land to the right of the runway.\"><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/ILS-spoofing-demo.jpg\" class=\"enlarge-link\" data-height=\"672\" data-width=\"1200\">Enlarge<\/a> <span class=\"sep\">\/<\/span> A plane in the researchers&#8217; demonstration attack as spoofed ILS signals induce a pilot to land to the right of the runway.<\/div>\n<div class=\"caption-credit\">Sathaye et al.<\/div>\n<aside id=\"social-left\" aria-label=\"Read the comments or share this article\">\n<h4 class=\"comment-count-before\"><a title=\"77 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/05\/the-radio-navigation-planes-use-to-land-safely-is-insecure-and-can-be-hacked\/?comments=1\">reader comments<\/a><\/h4>\n<p><a title=\"77 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/05\/the-radio-navigation-planes-use-to-land-safely-is-insecure-and-can-be-hacked\/?comments=1\"><span class=\"comment-count-number\">113<\/span> <span class=\"visually-hidden\">with 77 posters participating<\/span><\/a><\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/div>\n<\/aside>\n<p>Just about every aircraft that has flown over the past 50 years\u2014whether a single-engine Cessna or a 600-seat jumbo jet\u2014is aided by radios to safely land at airports. These instrument landing systems (ILS) are considered precision approach systems, because unlike GPS and other navigation systems, they provide crucial real-time guidance about both the plane\u2019s horizontal alignment with a runway and its vertical angle of descent. In many settings\u2014particularly during foggy or rainy night-time landings\u2014this radio-based navigation is the primary means for ensuring planes touch down at the start of a runway and on its centerline.<\/p>\n<p>Like many technologies built in earlier decades, the ILS was never designed to be secure from hacking. Radio signals, for instance, aren\u2019t encrypted or authenticated. Instead, pilots simply assume that the tones their radio-based navigation systems receive on a runway\u2019s publicly assigned frequency are legitimate signals broadcast by the airport operator. This lack of security hasn\u2019t been much of a concern over the years, largely because the cost and difficulty of spoofing malicious radio signals made attacks infeasible.<\/p>\n<p>Now, researchers have devised a low-cost hack that raises questions about the security of ILS, which is used at virtually every civilian airport throughout the industrialized world. Using a $600 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Software-defined_radio\">software defined radio<\/a>, the researchers can spoof airport signals in a way that causes a pilot\u2019s navigation instruments to falsely indicate a plane is off course. Normal training will call for the pilot to adjust the plane\u2019s descent rate or alignment accordingly and create a potential accident as a result.<\/p>\n<p>One attack technique is for spoofed signals to indicate that a plane\u2019s angle of descent is more gradual than it actually is. The spoofed message would generate what is sometimes called a \u201cfly down\u201d signal that instructs the pilot to steepen the angle of descent, possibly causing the aircraft to touch the ground before reaching the start of the runway.<\/p>\n<p>The video below shows a different way spoofed signals can pose a threat to a plane that is in its <a href=\"https:\/\/en.wikipedia.org\/wiki\/Final_approach_(aeronautics)\">final approach<\/a>. Attackers can send a signal that causes a pilot\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Course_deviation_indicator\">course deviation indicator<\/a> to show that a plane is slightly too far to the left of the runway, even when the plane is perfectly aligned. The pilot will react by guiding the plane to the right and inadvertently steer over the centerline.<\/p>\n<div class=\"wrapper\"><iframe loading=\"lazy\" type=\"text\/html\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Wp4CpyxYJq4?start=0&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen>[embedded content]<\/iframe><\/div>\n<div class=\"caption-text\">Wireless Attacks on Aircraft Landing Systems.<\/div>\n<p>The researchers, from Northeastern University in Boston, consulted a pilot and security expert during their work, and all are careful to note that this kind of spoofing isn&#8217;t likely to cause a plane to crash in most cases. ILS malfunctions are a known threat to aviation safety, and experienced pilots receive extensive training in how to react to them. A plane that\u2019s misaligned with a runway will be easy for a pilot to visually notice in clear conditions, and the pilot will be able to initiate a missed approach fly-around.<\/p>\n<p>Another reason for measured skepticism is the difficulty of carrying out an attack. In addition to the SDR, the equipment needed would likely require directional antennas and an amplifier to boost the signal. It would be hard to sneak all that gear onto a plane in the event the hacker chose an onboard attack. If the hacker chose to mount the attack from the ground, it would likely require a great deal of work to get the gear aligned with a runway without attracting attention. What&#8217;s more, airports typically monitor for interference on sensitive frequencies, making it possible an attack would be shut down shortly after it started.<\/p>\n<p>In 2012, Researcher&nbsp;Brad Haines, who often goes by the handle <a href=\"https:\/\/twitter.com\/ihackedwhat?lang=en\">Renderman<\/a>,&nbsp;<a href=\"https:\/\/www.ainonline.com\/aviation-news\/aviation-international-news\/2012-09-03\/ads-b-insecure-and-easily-spoofed-say-hackers\">exposed vulnerabilities<\/a> in the automatic dependent surveillance broadcast\u2014the broadcast systems planes use to determine their location and broadcast it to others. He summed up the difficulties of real-world ILS spoofing this way:<\/p>\n<blockquote>\n<p>If everything lined up for this, location, concealment of gear, poor weather conditions, a suitable target, a motivated, funded and intelligent attacker, what would their result be? At absolute worst, a plane hits the grass and some injuries or fatalities are sustained, but emergency crews and plane safety design means you&#8217;re unlikely to have a spectacular fire with all hands lost. At that point, airport landings are suspended, so the attacker can&#8217;t repeat the attack. At best, pilot notices the misalignment, browns their shorts, pulls up and goes around and calls in a maintenance note that something is funky with the ILS and the airport starts investigating, which means the attacker is not likely wanting to stay nearby.<\/p>\n<p>So if all that came together, the net result seems pretty minor. Compare that to the return on investment and economic effect of one jackass with a $1,000 drone flying outside Heathrow for 2 days. Bet the drone was far more effective and certain to work than this attack.<\/p>\n<\/blockquote>\n<p>Still, the researchers said that risks exist. Planes that aren\u2019t landing according to the <a href=\"https:\/\/www.quora.com\/What-are-the-functions-of-the-glide-slope-and-localizer\">glide path<\/a>\u2014the imaginary vertical path a plane follows when making a perfect landing\u2014are much harder to detect even when visibility is good. What\u2019s more, some high-volume airports, to keep planes moving, instruct pilots to delay making a fly-around decision even when visibility is extremely limited. The Federal Aviation Administration\u2019s <a href=\"http:\/\/fsims.faa.gov\/wdocs\/Orders\/8400_13.htm\">Category III approach operations<\/a>, which are in effect for many US airports, call for a decision height of just 50 feet, for instance. Similar guidelines are in effect throughout Europe. Those guidelines leave a pilot with little time to safely abort a landing should a visual reference not line up with ILS readings.<\/p>\n<p>\u201cDetecting and recovering from any instrument failures during crucial landing procedures is one of the toughest challenges in modern aviation,\u201d the researchers wrote in their paper, titled <a href=\"https:\/\/aanjhan.com\/assets\/ils_usenix2019.pdf\">Wireless Attacks on Aircraft Instrument Landing Systems<\/a>, which has been accepted at the <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity19\">28th USENIX Security Symposium<\/a>. \u201cGiven the heavy reliance on ILS and instruments in general, malfunctions and adversarial interference can be catastrophic especially in autonomous approaches and flights.\u201d<\/p>\n<h2>What happens with ILS failures<\/h2>\n<p>Several near-catastrophic landings in recent years demonstrate the danger posed from ILS failures. In 2011, <a href=\"https:\/\/www.flightglobal.com\/news\/articles\/singapore-777-300er-slides-off-munich-runway-364263\/\">Singapore Airlines flight SQ327<\/a>, with 143 passengers and 15 crew aboard, unexpectedly banked to the left about 30 feet above a runway at the Munich airport in Germany. Upon landing, the Boeing 777-300 careened off the runway to the left, then veered to the right, crossed the centerline, and came to a stop with all of its landing gear in the grass to the right of the runway. The image directly below shows the aftermath. The image below that depicts the course the plane took.<\/p>\n<p><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/singapore-airlines-flight-SQ327.jpg\" class=\"enlarge\" data-height=\"802\" data-width=\"1202\" alt=\"An instrument landing system malfunction caused Singapore Airlines flight SQ327 to slide off the runway shortly after landing in Munich in 2011.\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/singapore-airlines-flight-SQ327-640x427.jpg\" width=\"640\" height=\"427\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/singapore-airlines-flight-SQ327.jpg 2x\" alt=\"An instrument landing system malfunction caused Singapore Airlines flight SQ327 to slide off the runway shortly after landing in Munich in 2011.\"><\/a><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/singapore-airlines-flight-SQ327.jpg\" class=\"enlarge-link\" data-height=\"802\" data-width=\"1202\">Enlarge<\/a> <span class=\"sep\">\/<\/span> An instrument landing system malfunction caused Singapore Airlines flight SQ327 to slide off the runway shortly after landing in Munich in 2011.<\/div>\n<p> <a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/aircraft-path.png\" class=\"enlarge\" data-height=\"566\" data-width=\"1519\" alt=\"The path Singapore Airlines flight SQ327 took after landing.\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/aircraft-path-640x238.png\" width=\"640\" height=\"238\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/aircraft-path-1280x477.png 2x\" alt=\"The path Singapore Airlines flight SQ327 took after landing.\"><\/a><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/05\/aircraft-path.png\" class=\"enlarge-link\" data-height=\"566\" data-width=\"1519\">Enlarge<\/a> <span class=\"sep\">\/<\/span> The path Singapore Airlines flight SQ327 took after landing.<\/div>\n<p>An <a href=\"https:\/\/www.bfu-web.de\/EN\/Publications\/Investigation%20Report\/2011\/FactualReport_11_EX010_B777_Munic.pdf?__blob=publicationFile\">incident report<\/a> published by Germany\u2019s Federal Bureau of Aircraft Accident Investigation said that the jet missed its intended touch down point by about 1,600 feet. Investigators said one contributor to the accident was localizer signals that had been distorted by a departing aircraft. While there were no reported injuries, the event underscored the severity of ILS malfunctions. Other near-catastrophic accidents involving ILS failures are an <a href=\"https:\/\/www.caa.govt.nz\/assets\/legacy\/Accidents_and_Incidents\/Accident_Reports\/CAA_Occurrence_Report_00-2518.pdf\">Air New Zealand flight NZ 60 in 2000<\/a> and a&nbsp;<a href=\"https:\/\/www.onderzoeksraad.nl\/en\/page\/3003\/stick-shaker-warning-on-ils-final-eindhoven-airport\">Ryanair flight FR3531 in 2013<\/a>. The following video helps explain what went wrong in the latter event.<\/p>\n<div class=\"wrapper\"><iframe loading=\"lazy\" type=\"text\/html\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/PxBoTMs_iEs?start=0&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen>[embedded content]<\/iframe><\/div>\n<div class=\"caption-text\">Animation &#8211; Stick shaker warning and Pitch-up Upsets.<\/div>\n<p>Vaibhav Sharma runs global operations for a Silicon Valley security company and has flown small aviation airplanes since 2006. He is also a licensed Ham Radio operator and volunteer with the Civil Air Patrol, where he is trained as a search-and-rescue flight crew and radio communications team member. He\u2019s the pilot controlling the X-Plane flight simulator in the video demonstrating the spoofing attack that causes the plane to land to the right of the runway.<\/p>\n<p>Sharma told Ars:<\/p>\n<blockquote>\n<p>This ILS attack is realistic but the effectiveness will depend on a combination of factors including the attacker&#8217;s understanding of the aviation navigation systems and conditions in the approach environment. If used appropriately, an attacker could use this technique to steer aircraft towards obstacles around the airport environment and if that was done in low visibility conditions, it would be very hard for the flight crew to identify and deal with the deviations.<\/p>\n<\/blockquote>\n<p>He said the attacks had the potential to threaten both small aircraft and large jet planes but for different reasons. Smaller planes tend to move at slower speeds than big jets. That gives pilots more time to react. Big jets, on the other hand, typically have more crew members in the cockpit to react to adverse events, and pilots typically receive more frequent and rigorous training.<\/p>\n<p>The most important consideration for both big and small planes, he said, is likely to be environmental conditions, such as weather at the time of landing.<\/p>\n<p>\u201cThe type of attack demonstrated here would probably be more effective when the pilots have to depend primarily on instruments to execute a successful landing,\u201d Sharma said. \u201cSuch cases include night landings with reduced visibility or a combination of both in a busy airspace requiring pilots to handle much higher workloads and ultimately depending on automation.\u201d<\/p>\n<p>Aanjhan Ranganathan, a Northeastern University researcher who helped develop the attack, told Ars that GPS systems provide little fallback when ILS fails. One reason: the types of runway misalignments that would be effective in a spoofing attack typically range from about 32 feet to 50 feet, since pilots or air traffic controllers will visually detect anything bigger. It\u2019s extremely difficult for GPS to detect malicious offsets that small. A second reason is that <a href=\"https:\/\/arstechnica.com\/information-technology\/2012\/02\/uk-research-measures-growing-gps-jamming-threat\/\">GPS spoofing attacks are relatively easy to carry out<\/a>.<\/p>\n<p>\u201cI can spoof GPS in synch with this [ILS] spoofing,\u201d Ranganathan said. \u201cIt\u2019s a matter of how motivated the attacker is.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30154\/Plane-Radio-Navigation-For-Landing-Is-Insecure-And-Can-Be-Hacked.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27316,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[6768],"class_list":["post-27315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflawterror"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Plane Radio Navigation For Landing Is Insecure And Can Be Hacked 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-15T14:48:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"448\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked\",\"datePublished\":\"2019-05-15T14:48:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/\"},\"wordCount\":1690,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg\",\"keywords\":[\"headline,hacker,flaw,terror\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/\",\"name\":\"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg\",\"datePublished\":\"2019-05-15T14:48:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg\",\"width\":800,\"height\":448},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw,terror\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerflawterror\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/","og_locale":"en_US","og_type":"article","og_title":"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-05-15T14:48:42+00:00","og_image":[{"width":800,"height":448,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked","datePublished":"2019-05-15T14:48:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/"},"wordCount":1690,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg","keywords":["headline,hacker,flaw,terror"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/","url":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/","name":"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg","datePublished":"2019-05-15T14:48:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked.jpg","width":800,"height":448},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/plane-radio-navigation-for-landing-is-insecure-and-can-be-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw,terror","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflawterror\/"},{"@type":"ListItem","position":3,"name":"Plane Radio Navigation For Landing Is Insecure And Can Be Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27315"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27316"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}