Feeds

Hackers start poking holes in NFC

Not the standard's fault, though

The Essential Guide to IT Transformation

A researcher from the Fraunhofer Institute for Secure Information Technolog used the recent EUSecWest event to demonstrate progress in attacking NFC applications and to announce the availability of tools so that everyone can have a go at NFC hacking for fun and profit.

Near Field Communications is the RFID-based standard being built into mobile phones to allow them greater interaction with the physical world. NFC-enabled handsets can be used to pay for bus or train journeys, replacing existing contactless cards. They can read tags embedded in (Smart) posters that trigger a URL to be loaded or a phone number to be called.

NFC's problem is that it lacks a killer application, and not everyone agrees how the payment mechanisms should be organised. So far, only Nokia is selling an NFC-enabled handset, the 6131NFC, although the company has another model planned for later this year.

But NFC is compatible with previous contactless standards such as MiFare and Felica. So the Fraunhofer Institute for Secure Information Technology's Collin Mulliner has created a toolkit that turns a 6131NFC into a generic toolkit for testing deployments of those technologies, as well as looking at functionality unique to NFC deployments.

The two most interesting hacks involve replacing the NFC tag on a vending machine, and spoofing a URI in a Smart Poster to connect the user to somewhere other than they wished.

Oh Vienna

The vending machines in question are in Vienna where a phone is waved near the machine and an NFC connection asks the phone to send an SMS message, this premium-rate message is used to pay for the snack. The hacker simply switches NFC tags between two machines, then collects what is paid for by the poor chap using the other machine. This is hardly the fault of the NFC standard, but interesting nonetheless.

More important is the discovery that it's possible to display one URI to the phone's user, while trigging the handset to connect to a different one. This is typical phishing, but with the addition that an attacker could replace, say, an 0800 (freephone) number with a premium-rate number, and could then connect the call so the mark would be unaware of the switch.

The switch wouldn't be hard to accomplish either: simply copy an existing tag, changing the number, then stick your modified tag on top of the existing one with a bit of silver foil between the two. It's easy to imagine a tourist information or advertising tag being hacked in this way.

Collin told Nokia about the problems last month. The company is already working on a fix – the standard is so new that any serious security scare could see it stillborn, and Nokia needs it to succeed.

Other problems will no doubt emerge, but it's encouraging that Mulliner's attempts at fuzzing and brute-forcing MiFare encryption keys were unsuccessful. The provision of a toolkit should allow new security issues to be quickly identified and fixed – though Mulliner points out that his excellent toolkit is all done in Java, and thus limited to what Java allows him to do. Once we have open-OS handsets with NFC capabilities, things should get a lot more interesting. ®

Build a business case: developing custom apps

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Trying to sell your house? It'd better have KILLER mobile coverage
More NB than transport links to next-gen buyers - study
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Speak your brains on SIGNAL-FREE mobile comms firm here
Is goTenna tech a goer? Time to grill CEO, CTO
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.