Skip to main content

Study: Poachers are trying to hack animal trackers, intercept signals

poachers
Sasint/Pixabay
Poachers are turning to hacking and “cyber poaching” to stay one step ahead of animal conservationists, according to a new study.

The paper, co-published by researchers from several universities in Conservation Biology, claims that poachers are intercepting GPS signals sent from trackers that have been placed on protected animals. The researchers point out that while electronic tagging of endangered or at-risk animals has been beneficial, there are a “number of troubling and unanticipated issues” at the same time.

“Animal tracking can reveal animal locations (sometimes in nearly real-time), and these data can help people locate, disturb, capture, harm, or kill tagged animals,” the paper said.

In one case, dubbed “cyber poaching,” an Indian conservationist’s email account was reportedly targeted to gain sensitive data about a Bengal tiger. The tiger had been equipped with a $5,000 GPS tracker that sent location data to the email address every couple of hours. In this instance the alleged hackers were unsuccessful in scooping up the GPS data from the account after the conservationist was alerted to activity on the account, supposedly from a source over 600 miles away.

The researchers go on to claim that poachers in Yellowstone Park were able to use relatively cheap signal receivers to pick up on GPS signals from tagged wolves.

In another example, tagged white sharks in Australia provided hunters with valuable data on when sharks were congregated in one spot. The data was originally intended to advise beach-goers of when the waters were unsafe for swimming. Instead, this data was allegedly abused by cullers.

“A negative public perception of tagging and tracking could result in protest or cessation of research,” said the researchers.

The authors of the study are calling for more in-depth research into the use of animal tracking and how it can have negative unintended consequences on the wildlife it was designed to protect in the first place.

They suggest developing clearer data-sharing policies from regulators that would control who can access data on animals’ locations. The researchers also raised the alarm over the availability of telemetry devices whose use can be abused. They are calling on regulators “to develop clear and enforceable policies and regulations that limit the ability of the public to use telemetry tools for activities that are inconsistent with the mission of management agencies.”

Manufacturers of these devices need to act as well to ensure the products are more secure and employ encryption, the study authors added.

Editors' Recommendations

Elon Musk’s Starlink satellites hacked by $25 homemade device
A Starlink dish next to an RV.

A $25 hacking tool that can seemingly breach Starlink’s internet terminals has been revealed by a security researcher.

As reported by Wired and Gizmodo, Lennert Wouters, who works at Belgian university KU Leuven, showcased how to infiltrate the satellite dishes at the Black Hat Security Conference.

Read more
Selling something online? Watch out for this clever new scam
An individual holding a phone and card.

A credit/debit card stealing scheme that was initially discovered in 2020 has now been detected in Singapore.

As reported by Bleeping Computer, threat analysts at cybersecurity company Group-IB link it to "Classicscam," a global operation that has targeted individuals in Europe, Russia, and the U.S.

Read more
North Korean hackers are targeting crypto workers
A hand on a laptop in a dark surrounding.

Hackers believed to be associated with the North Korean-based cybercriminal group Lazarus have attempted yet another digital heist by targeting cryptocurrency firm deBridge Finance.

As reported by Bleeping Computer, deBridge operates as a “liquidity transfer protocol that allows decentralized transfer of data and assets” between multiple blockchain platforms.

Read more