NFC gives hackers access to Android phones

Thieves could gain access to Android mobile phones via Near Field Communication (NFC) connections, researchers have shown.

NFC gives hackers access to Android phones

According to serial phone hacker Charlie Miller, the hack would work with many NFC capable handsets, and casts a shadow over payment systems using the technology. “I can take over your phone,” Miller said.

The hack – and a range of malware vulnerabilities – was shown off at the Black Hat hacking conference in Las Vegas, where 6,500 corporate and government security professionals gathered to learn about emerging threats to networks.

NFC allows users to share photos with friends, make payments or exchange other data by bringing Android phones within a few centimetres of similarly equipped devices, such as another smartphone or payment terminal.

Google has added some great security features, but nobody has them

Miller said he had created a device the size of a postage stamp that could be stuck in an inconspicuous place, such as near a cash register at a restaurant. When an Android handset is close enough, he could gain access to the system. Miller also showed off Bluetooth hacks to access data stored on handsets.

Miller and fellow hacking expert, Georg Wicherski of CrowdStrike, also infected an Android phone with a piece of malicious code that Wicherski unveiled in February. That piece of software exploits a security flaw in the Android browser that was publicly disclosed by Google’s Chrome browser development team.

There’s been an ongoing debate on the level of the malware threat to Android users, with some experts questioning scare tactics from antivirus firms. The demonstrations show the problem does at least exist, despite Google trying to improve the situation with its Bouncer detection system. “Google is making progress, but the authors of malicious software are moving forward,” said Sean Schulte of Trustwave’s SpiderLabs.

Update system a weakness

Google has fixed the flaw in Chrome, which is frequently updated, so that most users are protected, but Wicherski said Android users are still vulnerable because carriers and device manufacturers have not pushed those fixes or patches out to users.

Marc Maiffret, chief technology officer of the security firm BeyondTrust, said: “Google has added some great security features, but nobody has them.”

Experts say iPhones and iPads don’t face the same problem because Apple pushes out security updates fairly quickly after they are released.

Play Store exploits

Two Trustwave researchers also told attendees about a technique they discovered for evading Google’s “Bouncer” technology for identifying malicious programs in its Google Play Store.

They created a text-message blocking application that uses a legitimate programming tool known as JavaScript Bridge. JavaScript Bridge lets developers remotely add new features to a program without going through the normal Android update process.

Companies including Facebook and LinkedIn use JavaScript Bridge for legitimate purposes, according to Trustwave, but it could also be exploited maliciously.

To prove their point, the researchers loaded malicious code onto one of their phones and remotely gained control of the browser. Once they did that, they could force it to download more code and grant them total control.

“Hopefully Google can solve the problem quickly,” said Nicholas Percoco, senior vice president of Trustwave’s SpiderLabs. “For now, Android is the Wild West.”

Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way.

Todays Highlights
How to See Google Search History
how to download photos from google photos