- ‘Star Trek’s Jonathan Frakes calls out your lies with this new meme Saturday 3:46 PM
- #JusticeForLucca trends after video shows police slam Black teen’s head into pavement Saturday 3:11 PM
- The internet is shocked to learn that Goombas do, in fact, have arms Saturday 2:02 PM
- PayPal, GoFundMe cut off armed militia that detains migrants at border Saturday 1:16 PM
- Barnwood theft may be on the rise because of ‘Fixer Upper’—and fans aren’t having it Saturday 12:23 PM
- Literary Twitter calls out Dzanc Books for Islamophobic, racist novel Saturday 11:40 AM
- How to watch Crawford vs. Khan online Saturday 10:00 AM
- Beyoncé has 2 more projects coming to Netflix after ‘Homecoming’ Saturday 9:53 AM
- How to watch Danny Garcia vs. Adrian Granados for free Saturday 9:00 AM
- The ‘Feeling Cute Challenge’ turns ugly after correctional officers abuse it Saturday 7:30 AM
- How to watch ‘How High 2’ for free Saturday 7:00 AM
- Swipe This! My ex-BFF keeps sliding into my DMs, but I don’t want to be friends Saturday 6:30 AM
- Watch ‘I Am Somebody’s Child: The Regina Louise Story’ for free Saturday 6:00 AM
- How to watch Barcelona vs. Real Sociedad for free Saturday 6:00 AM
- How to stream UFC Fight Night 149 for free Saturday 5:30 AM
Hackers can force a high-tech sniper rifle to shoot the wrong target
So, this is disturbing.
A new hardware hack could alter the intended path of a high-power rifle’s bullet.
Runa Sandvik and Michael Auger, a married pair of computer security experts, have successfully used their skills to access and fundamentally alter how one type of Wi-Fi-enabled hunting rifle operates. In the hack, Sandvik and Auger demonstrate how it is possible to tinker with a rifle’s ammunition weight data in order to shoot something other than the intended target. For this to happen, the gun must within range (pun intended?) of a Wi-Fi network.
A demonstration of this hack at a West Virginia firing range saw Sandvik and Auger fire the demo gun normally once before changing its ammo weight variable to (a preposterous) 72 pounds in order to hit a bullseye 2.5 feet away from the bullet’s original mark.
This vulnerability enables other destructive scenarios too: malicious actors might gain root access control of the weapon, where they could make permanent changes to a Linux-powered device’s targeting variables. They could also delete essential files, rendering the gun’s electronics completely unusable, or even lock out the rightful owner from using the weapon by creating a new PIN code.
Importantly, the couple’s hack does not enable them to remotely fire the gun. To do so is still only possible with the manual press of a finger on the trigger. It’s this simple fact that has TrackingPoint CEO John McHale ultimately unworried about the vulnerability his product—Sandvik and Auger conducted their experiments by buying two of his company’s TP750 models.
Sandvik and Auger tried repeatedly to contact the company with news of their discoveries, but it wasn’t until they told Wired their story that the company responded. “The shooter’s got to pull the rifle’s trigger, and the shooter is responsible for making sure it’s pointed in a safe direction,” said McHale. “It’s my responsibility to make sure my scope is pointed where my gun is pointing. The fundamentals of shooting don’t change even if the gun is hacked.”
TrackingPoint is collaborating with Sandvik and Auger on a patch to repair these vulnerabilities. All TrackingPoint customers using susceptible hardware will be able to update their gun with free software to be mailed to them on USB thumbdrives.
Dylan Love is an editorial consultant and journalist whose reporting interests include emergent technology, digital media, and Russian language and culture. He is a former staff writer for the Daily Dot, and his work has been published by Business Insider, International Business Times, Men's Journal, and the Next Web.