Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Android Hacked via NFC on the Samsung Galaxy S3 (thenextweb.com)
58 points by ge0rg on Sept 20, 2012 | hide | past | favorite | 21 comments


It's not limited to NFC (email or website can be used as attack vectors), but the researchers apparently decided to show off the NFC method as it's a relatively new medium for malware (though of course not a very practical one).


> the NFC method as it's a relatively new medium for malware (though of course not a very practical one).

Why not? Ever since I heard of the idea of trying to replace QR codes with passive always on NFC I've thought that this will be one of the first methods for massive infections of smartphones. Just put one in a public place(public transportation, store, etc.)


I doubt it -- the range of NFC seems to be very bad. Unless the malware can turn up the gain, you have to hold the phones back-to-back within about a centimeter of each other.


Is this true? My understanding is that the range issue of NFC has more to do with the non-powered nature of NFC chip, thus having very limited broadcasting range. If I had a powered device that broadcasted NFC responses over a much greater range, wouldn't the phone happily accepting this as an NFC chip response?


It's just a feature of this particular hack that it was two phones. The real-world manifestation would probably be an NFC skimmer, like ATM skimmers [1]. Slam the virus in, then proxy the original request (or vice versa, depends on the timing), use the network on the phone to connect to the malware hub control, owned phone.

Note you only have to slam a shim in; the shim can then download an arbitrary payload.

[1]: http://krebsonsecurity.com/2012/07/atm-skimmers-get-wafer-th...


The vector is the same as for QR codes, paste a different tag overtop of a legitimate tag that takes the user to a URI with a browser or other application exploit. Or physical world version of phishing. Again it is the application that is the root of the vulnerability. NFC would be no worse than a QR code or even a malicious URL printed in plain english on a poster.

The only unique theoretical option would be to hack a very highpowered antenna and transmitter to try and pick up blast out RFID-compatible signals to/from the very weak NFC radios of handsets from further away.


People have been hacking ATMs for years by installing gear on those ATMs. With NFC, such skimming might be much easier, as the gear you need to install can be _tiny_, and you only need to be in the vicinity of the target, making it easier to camouflage.

And attacks doesn't need to come from cots phones, with your own higher gain NFC device, you can interact with with ordinary NFC devices from greater distances.


or maybe you could embed your hack in on of these ads. http://nfctimes.com/sites/default/files/imagecache/poster/nf...


Not only is it low-range (~2" in my experience), at least in Android the phone has to be on+unlocked before NFC is on. The only realistic route for this attack is a compromised NFC device (such as a payment terminal) that your victim would be using anyway. For that sort of effort, compromising a Wi-Fi hotspot would likely be more effective in terms of reach.


I think NFC is a far less interesting attack vector simply because I'd expect NFC links to be with at least somewhat trusted partners.


The magnetic strip and chip duplication technology in gas stations and convenience stores are already a point of frustration for insurers, financial services and consumers. Exploiting NFC which is intended to be a generally-accepted payment method in the near future does not give me the warm-and-fuzzies


It looks to me like the same vector Charlie Miller showed off a couple of months ago. The NFC Forum responded at the time along the lines of "It's not an NFC thing," and said his demonstration "underscores the importance of providing appropriate security measures at the application layer and enabling users to adjust security settings to suit their own needs and preferences"

http://www.nfcworld.com/2012/08/01/317100/forum-responds-to-...


The article mentions that the "flaw had to be triggered 185 times in the exploit code in order to overcome some of the vulnerability’s limitations".

How long would that take to trigger through the NFC interface?


The flaw is not triggered over NFC. The payload is uploaded once, and the payload executes the exploit repeatedly (locally) until it works.


With a Galaxy Nexus it takes a 1-3 seconds for the NFC interface to ping another source, receive/process a tag, and then "ding" to confirm NFC contact.


Now someone needs to create an app that detects this attack, prevents it and hits the attacker back using the same technique.


Having just bought a Galaxy S3 from T-Mobile, I can tell you that it ships with NFC turned off by default.


The implication is that this isn't really related to NFC. They're hitting a vulnerability in some content handler or another (thus the "also be abused via [...] malicious websites or email attachments" bit). So this has to be fixed regardless. It's not really a problem with NFC per se.

The use of NFC for the demo was showmanship, basically. It gets them attention, and also serves to point out that a comparatively-little-known feature of the phone can be an attack vector too.


I agree. It's a serious vulnerability. But it's not the sci-fi crowded subway car hack that the headline implies.


And when it's enabled the phone has to be on and unlocked to respond to NFC.


So from a brief read

- Android 4.1+ (JB and above) include full ASLR which will mitigate this vulnerability somewhat

- From my own Android experience, the screen must be active for the NFC receiver to active. This means the phone can't be exploited while it sits in your pocket.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: