Malware Infects U.S. Drone Computer Systems
A source familiar with the infection said, "We keep wiping it off, and it keeps coming back. We think it’s benign. But we just don’t know."
It's hard to see how a keylogger could be benign. Keyloggers infesting computers are often attempting to gain access to passcodes and pins, hardly a benign operation.
Military security specialists still haven't determined if the malware was introduced intentionally or by accident. They are also unsure exactly how far the malware has spread, although they are sure that it has infected both classified and unclassified machines at Creech Air Force Base in Nevada, which is where most U.S. drone flights are "flown."
The United States' Reaper and Predator drones aren't the most secure beasts in the world; we've already covered how many don’t encrypt the video they transmit to American troops on the ground, and how, in the summer of 2009, U.S. forces discovered that a $26 piece of software called SkyGrabber allowed insurgents to capture drone video.
A source said that the malware is “... getting a lot of attention,” but that "... no one’s panicking. Yet." However, senior officers at Creech receive daily briefings on the virus, meaning there is a decent level of concern.