Think Information. Think Security.
 
Picture
In a packed room at the Black Hat computer security conference in Las Vegas yesterday, an Android smartphone was tapped with a white plastic card, and within seconds it was running malicious code that allowed an attacker to remotely access the device.

The demonstration was given by high-profile hacker Charlie Miller, who was the first person to demonstrate a way to seize control of the iPhone, in 2007, and who has demonstrated many novel attacks on Apple devices since. He outlined a number of reasons why the contactless near-field communication, or NFC, chips appearing in smartphones will bring new security worries as well as convenient new features—a talk that was the result of nine months of research. "NFC is cool [for hackers] because you don't need to have the user do anything," said Miller. In contrast, in order to compromise a computer or non-NFC phone, criminals typically have to trick users into doing something out of the ordinary, such as opening a Web page or e-mail attachment they shouldn't.

Miller's Android NFC hack was made possible by a feature called Android Beam, which allows phones with NFC chips to exchange photos and other data. An NFC-equipped phone can send a URL to another when the two are tapped together, and the receiving device will open the page without offering the user a chance to decline. Miller created a passive NFC tag that mimicked a phone using Android Beam to send a Web address, and made use of a bug in Google's browser previously discovered by researchers at security startup CrowdStrike to gain control (see "How a Web Link Can Take Control of Your Phone").

NFC interactions typically require being within four centimeters of a phone, says Miller, so using such attacks against a person in the street would be difficult. "A more realistic attack is replacing an NFC reader [for accepting payments], in a cab or somewhere else, with a malicious one,". Passive NFC tags are increasingly being used in posters and other marketing materials and could be used for such attacks, too.

Miller also presented evidence that sending a corrupt NFC signal to a contactless phone could cause it to access and run malicious code. He probed for weaknesses in Nokia and Google's NFC software by sending tens of thousands of slightly modified signals to see if any would cause problems and he has found several promising bugs that could allow the execution of code to steal data or take control of a device.

Cross-posted from: Technology Review



Leave a Reply.