#BlackHat: Phones hijacked by malicious NFC tag

Powered by SC Magazine
 

Android, Nokia compromised.

View larger image View larger image View larger image

See all pictures here »

A malicious wireless  tag has been created that can crack an Android phone in seconds.

The tag exploits a vulnerability in near field communication (NFC), a wireless technology popular on Android phones that establishes communication between devices through physical contact.

Well-known Apple hacker and Accuvant researcher Charlie Miller wowed the crowed at Black Hat Las Vegas through a demo that involved infiltrating an Android phone by simply grazing it with a tag embedded with an NFC chip.

Black Hat 2012 coverage

Once the phone was tagged, the browser opened to a phony web page that gave Miller full access to the data on the device. 

The exploited Android vulnerability was already patched by Google, but  Miller also discovered a similar bug in Nokia N9 which runs on the MeeGo platform.

Miller told SC he decided to focus his latest research on the little researched NFC technology because exploiting it does not require user interaction.

"I'm always looking for something to pick on," he said.

Miller believes the lack of in the wild attacks against NFC may be because the technology still isn't prevalent.

"If you imagine a time when you're always paying with your phone, these [attacks] would be everywhere," he said. "Replacing NFC tags with malicious ones are totally realistic. It's the equivalent of ATM skimming."

There is a way to make the technology more secure, such as prompting a user to opt in to each exchange they make, but the solution would affect the convenience of NFC, Miller said.

"You would have to give up some of that convenience to make it more secure," he said.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Do you direct debit customers? Read this
Oct 10, 2014
Authorities have been targeting direct debit practices with iiNet and Dodo receiving formal ...
Optus expands 4G coverage
Oct 10, 2014
If you rely on an Optus phone for work you might be interested to know that there are now 200 ...
Microsoft Office is now free for some charities
Oct 10, 2014
Microsoft has announced that eligible Australian non-profit organisations and charities can now ...
Vodafone lights up 4G in Adelaide
Oct 9, 2014
Live and work in Adelaide? Vodafone has switched on its 4G network in the city and suburbs.
Next year tradies will be able to take payments using ingogo
Oct 3, 2014
Ingogo is going to provide a card payment service for Xero users.
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 141

Vote