Android and Nokia NFC exploits detailed at Black Hat

The Black Hat security conference kicked off yesterday in Las Vegas, and one researcher has demonstrated an NFC exploit that affects Android and certain Nokia phones. Charlie Miller showed how NFC is typically enabled by default on most Android phones, and by getting close enough to the device it could be redirected automatically to malicious websites. In addition, he was able to send malware over to the device that exploits the browser, allowing the attacker to read cookie data, view web history, and even hijack the phone.

All of that could be done with no user interaction, Miller said. Certain posters use NFC tags to direct users to websites, and Miller detailed how modifying the tag on such posters could redirect users to malware or an exploited website. The problem lies with the NFC system automatically redirecting users to websites. Instead, phones should be secured so that the user receives a prompt, telling them that they’re being directed to a specific address.

In addition, Miller detailed how the Nexus S and Galaxy Nexus had bugs in the NFC parsing code, although he didn’t focus his attention on exploiting those holes. Ice Cream Sandwich reportedly patched the holes, but phones running Gingerbread are still vulnerable. Miller also pointed out a similar NFC issue on the MeeGo-based Nokia N9. That phone allows devices to be paired via NFC even if Bluetooth is turned off, which could allow an attacker to send text messages or make phone calls.

Still, it’s not all bad news: NFC doesn’t function when the device is locked and the screen is turned off. Even then, an attacker would need to get within a couple of centimeters of the device to trigger NFC connectivity. Having said that, passive attacks like the above poster example could be used to lure people into scanning malicious tags.

[via CNET]


Android and Nokia NFC exploits detailed at Black Hat is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget

Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget

Admittedly, the headline is designed to get your dander up. You’re in no immediate danger of a technologically-gifted thief plugging a couple of wires into your hotel door and making off with your sack of souvenirs from the Mall of America. But that’s not to say it’s impossible. Cody Brocious, who was recently brought on by Mozilla to work on Boot to Gecko, is giving a presentation at the annual Black Hat conference in Vegas where he demonstrates a method for cracking open keycard locks with a homemade $50 device. The hack only works on locks made by Onity at the moment, and real life testing with a reporter from Forbes only succeeded in opening one of three hotel doors. Still, with between four and five million Onity locks installed across the country (according to the company), that is a lot of vulnerable rooms. The attack is possible thanks to a DC jack on the underside of the lock that’s used to reprogram the doors. This provides direct access to the lock’s memory, which is also home to the numeric key required to release the latch — a key that is protected by what Brocious described as “weak encryption.” Ultimately the source code and design for the Arduino-based unlocker will be published online alongside a research paper explaining how these locks work and why they’re inherently insecure. The hope is that manufacturers will take notice and improve the security of their wares before the world’s ne’er-do-wells perfect Brocious’ technique.

Filed under:

Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget originally appeared on Engadget on Tue, 24 Jul 2012 18:34:00 EDT. Please see our terms for use of feeds.

Permalink Ubergizmo  |  sourceForbes, Black Hat  | Email this | Comments

Apple to present at Black Hat conference for first time, talk about iOS’ padlocks

iPhone 4 rooted with Cydia

Apple is taking a different, more cautious tack when it comes to security these days. That doesn’t make it any less surprising that the company is planning to give a presentation at the Black Hat conference: the company will have someone on stage for the first time and won’t just socialize in the corridors. When he takes to the podium on July 26th, platform security manager Dallas De Atley will go into detail regarding iOS’ security measures in front of an audience used to finding a way around them. The company hasn’t said whether that involves current or future technology; we suspect that Apple may be eager to show what iOS 6 brings to the table, however. If it all goes down like Black Hat general manager Trey Ford says it will, Apple may both open up a bit on security and set more of the agenda this week — instead of letting conference goers set it themselves.

Filed under: , ,

Apple to present at Black Hat conference for first time, talk about iOS’ padlocks originally appeared on Engadget on Tue, 24 Jul 2012 11:51:00 EDT. Please see our terms for use of feeds.

Permalink Bloomberg  |  sourceBlack Hat  | Email this | Comments

Latest ATM skimmers get thinner

ATM skimmers lift credit and debit card information by attaching to the card slot on the machine, although such modifications have typically been spotted quickly due to their bulky and obvious nature. Over the years, skimmers have become increasingly hard to detect, resulting in mass fraud until the banks fix the affected ATM. The latest generation of ATM skimmers are said to be so thin that they can be inserted directly into a card slot without arousing suspicion.

Recent reports from the European ATM Security Team detail a new skimming device that can be inserted directly into an ATM card reader thanks to its svelte frame. Just like other skimmers, it lifts information from the magnetic strip on the back of a credit or debit card and stores it for later retrieval. Bulky ATM skimmers can be easily avoided, but a device that fits directly into the card reader could be difficult to detect.

Still, such devices need the most crucial piece of information: your PIN. The only way to lift that is by using a secondary device, typically either an overlay on top of the keypad on an ATM or a hidden camera. Cameras may be a little tricky to spot, but any modifications to the keypad should be easier to detect. As always, if something doesn’t seem right about an ATM you’re trying to use, call the bank and try to find another machine.

[via Krebs on Security]


Latest ATM skimmers get thinner is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


DARPA-backed Power Pwn is power strip by day, superhero hack machine by night

DARPAbacked Power Pwn is power strip by day, superhero hack machine by night

Call the Power Pwn the champion of white hat hacking. Underneath that Clark Kent power strip exterior, there’s a Superman of full-scale breach testing that can push the limits of just about any company network, whether it takes 3G, Ethernet or WiFi to get there. Pwnie Express’ stealthy sequel to the Pwn Plug ships with a Debian 6 instance of Linux whose handy hacking tools are as easy to launch as they are tough to detect. There’s just one step needed to create a snoop-friendly Evil AP WiFi hotspot, and the box dodges around low-level NAC/802.1x/RADIUS network authentication without any help; in the same breath, it can easily leap into stealth mode and keeps an ongoing encrypted link to give do-gooders a real challenge. The hacker doesn’t even need to be in the same ZIP code to crack a firewall or VPN — the 3G link lets the Power Pwn take bash command-line instructions through SMS messages and doles out some of its feedback the same way. While the $1,295 device can theoretically be used for nefarious purposes, DARPA’s blessing (and funding) should help keep the Power Pwn safely in the hands of security pros and thwart more than a few dastardly villains looking for weak networks.

Filed under: ,

DARPA-backed Power Pwn is power strip by day, superhero hack machine by night originally appeared on Engadget on Sun, 22 Jul 2012 07:54:00 EDT. Please see our terms for use of feeds.

Permalink Wired  |  sourcePwnie Express  | Email this | Comments

That In-App Purchase Hack Now Works For OS X Apps Too [Apple]

Earlier in the week a Russian hacker—Alexy Borodin—revealed a fairly easy way to make in-app purchases in iOS without actually paying for them. Apple has of course since been working on a fix to the gaping hole, but adding insult to injury, Alexy has now revealed that a very similar hack also works with desktop apps downloaded from the Mac App Store. More »

Global spam falls by 18% as Grum botnet is knocked offline

There are dedicated botnets out there in the wide world that exist solely for the purpose of distributing spam. Grub, the third largest botnet in the world, was finally taken offline by security experts yesterday, resulting in a dramatic 18% reduction of global spam. Grum’s servers, which were based in Russia, Panama, and the Netherlands, controled around 100,000 PCs. The two botnets that take first and second place, Cutwail and Lethic, are still active.

It took three days for security teams to knock the Grum servers offline, and the team is confident that it won’t be able to start back up again anytime soon: “The botnet does not have any apparent fall back mechanisms that would allow it to spin back up easily in the days to come.” Two command and control servers in the Netherlands were targeted first, then a Panamanian ISP eventually shut down another after feedback from the community.

It wasn’t all that easy, however, as six new command and control servers were enabled in the Ukraine after the Panama server was shut down. Eventually the FireEye Malware Intelligence Lab enrolled heavy cooperation from Russian ISPs and domain registrars, bringing all the servers down once and for all on Wednesday. Some of the bots are still sending out spam, but researchers believe it will eventually wither and die as the template memory runs dry.

[via PCMag]


Global spam falls by 18% as Grum botnet is knocked offline is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


HTC HD2 gets unofficial Android 4.1 Jelly Bean port, becomes the Phone That Would Not Die

HTC HD2 gets unofficial Android 41 Jelly Bean port, becomes the Phone That Would Not Die

There’s a golden rule for the HTC HD2: if there’s a new mobile OS, the HD2 must get a port. It’s practically a law of nature, then, that Evervolv at the XDA-Developers forums has produced a pre-alpha port of Android 4.1 for the originally Windows Mobile-based legend. More components are working than not despite the extremely early state, with the camera, Google Now and web browser being the remaining bugaboos. We’re still warned that the experimental firmware isn’t meant for day-to-day use, but there’s every intention of making the release stable — good news for anyone who’s eager to avoid a flash-in-the-pan ROM. If that happens, the HD2 will have had nearly as many lives as a cat.

Filed under:

HTC HD2 gets unofficial Android 4.1 Jelly Bean port, becomes the Phone That Would Not Die originally appeared on Engadget on Mon, 16 Jul 2012 23:38:00 EDT. Please see our terms for use of feeds.

Permalink Electricpig  |  sourceXDA-Developers  | Email this | Comments

Anonymous and WikiLeaks relationship detailed

The strange nature of the relationship between Anonymous and WikiLeaks has been detailed in a report from International Business Times. Members of the group spoke to IBTimes following a Twitter row over the leaked emails from Syria, with one individual saying the relationship between the two entities is “complex.” As it turns out, there’s crossover between both groups, with some individuals working on both sides to gather and expose information.

Anonymous and WikiLeaks are said to have similar aspirations, hence the heavy crossover between the personnel: “Both groups are first and foremost information activists, so there is a common ground between us.” One member of Anonymous went on to detail the work behind the Syria email leaks, saying the group working tirelessly to breach “multiple domains and dozens of servers.” While the information was handed off to WikiLeaks, the organization didn’t reveal its relationship with Anonymous.

The hacktivist group doesn’t seem to mind, however: “Nor would they be expected to reveal their source that is after all what WikiLeaks is all about.” There’s also the fact that WikiLeaks seems to have no qualms about releasing any information. Anonymous is said to have negotiated with Al-Jazeera regarding the release of the email dumps, but “no suitable disclosure agreement could be negotiated.”

Still, Anonymous is looking ahead to the future. Members of the group have recently launched their own version of Wikileaks, dubbed Par:AnoIA. The site is designed is host Anonymous leaks, and is said to have been created to gain better media coverage for highly sensitive dumps and expose information faster than WikiLeaks.


Anonymous and WikiLeaks relationship detailed is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


CyanogenMod developers slap Jelly Bean on an Optimus 4X HD, tease CM10 (video)

CyanogenMod developers slap Jelly Bean on an Optimus 4X HD, tease CM10

That didn’t take long. The boys behind CyanogenMod promised a quick turnaround for its upcoming JellyBean-based update and are already teasing workable CM10 ROMs. CyanogenMod’s Ricardo Cerqueira tossed a video of an early CM10 build on his YouTube page, declaring “it lives!” The early build is running on an LG Optimus 4X HD, and runs through unlocking the screen and recording and playing back a video. The build is still having some trouble with Google’s revamped search integration, but considering Android 4.1’s source code was released only days ago, the quick development is promising. Check out Cercuiera’s quick demo for yourself after the break.

Continue reading CyanogenMod developers slap Jelly Bean on an Optimus 4X HD, tease CM10 (video)

Filed under: ,

CyanogenMod developers slap Jelly Bean on an Optimus 4X HD, tease CM10 (video) originally appeared on Engadget on Fri, 13 Jul 2012 10:58:00 EDT. Please see our terms for use of feeds.

Permalink PhoneArena, AndroidCentral  |  sourceRicardo Cerqueira (Google+)  | Email this | Comments