#BlackHat: Phones hijacked by malicious NFC tag

Powered by SC Magazine
 

Android, Nokia compromised.

View larger image View larger image View larger image

See all pictures here »

A malicious wireless  tag has been created that can crack an Android phone in seconds.

The tag exploits a vulnerability in near field communication (NFC), a wireless technology popular on Android phones that establishes communication between devices through physical contact.

Well-known Apple hacker and Accuvant researcher Charlie Miller wowed the crowed at Black Hat Las Vegas through a demo that involved infiltrating an Android phone by simply grazing it with a tag embedded with an NFC chip.

Black Hat 2012 coverage

Once the phone was tagged, the browser opened to a phony web page that gave Miller full access to the data on the device. 

The exploited Android vulnerability was already patched by Google, but  Miller also discovered a similar bug in Nokia N9 which runs on the MeeGo platform.

Miller told SC he decided to focus his latest research on the little researched NFC technology because exploiting it does not require user interaction.

"I'm always looking for something to pick on," he said.

Miller believes the lack of in the wild attacks against NFC may be because the technology still isn't prevalent.

"If you imagine a time when you're always paying with your phone, these [attacks] would be everywhere," he said. "Replacing NFC tags with malicious ones are totally realistic. It's the equivalent of ATM skimming."

There is a way to make the technology more secure, such as prompting a user to opt in to each exchange they make, but the solution would affect the convenience of NFC, Miller said.

"You would have to give up some of that convenience to make it more secure," he said.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Qantas checks in with cloud computing
Impressed with results of public cloud bake-off.
 
Is the legacy of shared services holding WA back?
Auditor-General explains wariness towards central control.
 
Defence renews IBM contract for $264 million
Awards another closed extension.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Carpet cleaner faces court over online testimonials
Jul 4, 2014
The ACCC has initiated proceedings against A Whistle (1979) Pty Ltd, the franchisor of Electrodry...
You can now get 15GB of free online storage using Microsoft OneDrive
Jun 25, 2014
Cloud storage has reached both the capacity and price where it's a viable alternative to local ...
Another clever trick you can perform with Xero
Jun 25, 2014
Here is another way to reach out to particular subsets of your customers using Xero.
Have a phone, tablet and laptop?
Jun 20, 2014
This new Telstra pre-paid 4G mobile hotspot might be useful if you regularly need to use fast ...
This scam isn't going away
Jun 19, 2014
The Australian Competition and Consumer Commission is warning small business people to beware of ...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  21%
 
Application integration concerns
  3%
 
Security and compliance concerns
  32%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 485

Vote