- PewDiePie banned in China after reacting to Winnie the Pooh memes 4 Years Ago
- How to stream Cowboys vs. Eagles on Sunday Night Football Today 7:00 AM
- How to stream Chargers vs. Titans in Week 7 Today 6:00 AM
- 13 spooky romance games for adults Today 6:00 AM
- How to stream ‘Power’ season 6, episode 9 Today 5:00 AM
- How to stream Impact Wrestling’s Bound For Glory Today 5:00 AM
- How to stream Bills vs. Dolphins in Week 7 Today 4:30 AM
- How to stream Jaguars vs. Bengals in Week 7 Today 4:00 AM
- How to stream Texans vs. Colts in Week 7 Today 3:00 AM
- How to stream Manchester United vs. Liverpool Saturday 10:00 PM
- Man dragged for recording, posting video of neighbor being ‘killed’ instead of helping Saturday 4:14 PM
- How to stream Saints vs. Bears in Week 7 Saturday 3:25 PM
- How to stream Seahawks vs. Ravens in Week 7 Saturday 3:25 PM
- Are TikTok teens throwing up gang signs in their videos? Saturday 2:45 PM
- Anti-impeachment protesters believe ‘deep state’ tried to sabotage rally Saturday 12:51 PM
Hackers can force a high-tech sniper rifle to shoot the wrong target
So, this is disturbing.
A new hardware hack could alter the intended path of a high-power rifle’s bullet.
Runa Sandvik and Michael Auger, a married pair of computer security experts, have successfully used their skills to access and fundamentally alter how one type of Wi-Fi-enabled hunting rifle operates. In the hack, Sandvik and Auger demonstrate how it is possible to tinker with a rifle’s ammunition weight data in order to shoot something other than the intended target. For this to happen, the gun must within range (pun intended?) of a Wi-Fi network.
A demonstration of this hack at a West Virginia firing range saw Sandvik and Auger fire the demo gun normally once before changing its ammo weight variable to (a preposterous) 72 pounds in order to hit a bullseye 2.5 feet away from the bullet’s original mark.
This vulnerability enables other destructive scenarios too: malicious actors might gain root access control of the weapon, where they could make permanent changes to a Linux-powered device’s targeting variables. They could also delete essential files, rendering the gun’s electronics completely unusable, or even lock out the rightful owner from using the weapon by creating a new PIN code.
Importantly, the couple’s hack does not enable them to remotely fire the gun. To do so is still only possible with the manual press of a finger on the trigger. It’s this simple fact that has TrackingPoint CEO John McHale ultimately unworried about the vulnerability his product—Sandvik and Auger conducted their experiments by buying two of his company’s TP750 models.
Sandvik and Auger tried repeatedly to contact the company with news of their discoveries, but it wasn’t until they told Wired their story that the company responded. “The shooter’s got to pull the rifle’s trigger, and the shooter is responsible for making sure it’s pointed in a safe direction,” said McHale. “It’s my responsibility to make sure my scope is pointed where my gun is pointing. The fundamentals of shooting don’t change even if the gun is hacked.”
TrackingPoint is collaborating with Sandvik and Auger on a patch to repair these vulnerabilities. All TrackingPoint customers using susceptible hardware will be able to update their gun with free software to be mailed to them on USB thumbdrives.
Dylan Love is an editorial consultant and journalist whose reporting interests include emergent technology, digital media, and Russian language and culture. He is a former staff writer for the Daily Dot, and his work has been published by Business Insider, International Business Times, Men's Journal, and the Next Web.