Vulnerability Analysis and Attacks on NFC enabled Mobile Phones



Similar documents
Attacking NFC Mobile Phones

Course Content: Session 1. Ethics & Hacking

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS


Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Security Evaluation CLX.Sentinel

Overview of computer and communications security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Overview of the Penetration Test Implementation and Service. Peter Kanters

APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10

Security Challenges for User-Oriented RFID Applications within the Internet of Things

Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited

Android Commercial Spyware Disease and Medication

Sitefinity Security and Best Practices

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Ethical Hacking & Cyber Security Workshop

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Threat Modeling for offline NFC Payments

NFC Near Field Communication

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Web Application Penetration Testing

Where every interaction matters.

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

Top tips for improved network security

Cross-Site Scripting

NFC. Technical Overview. Release r05

Man-in-the-Middle Attacks against the chiptan comfort Online Banking System

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

You don t hear me but your phone s voice interface does. José LOPES ESTEVES & Chaouki KASMI

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Using RFID Techniques for a Universal Identification Device

OWASP AND APPLICATION SECURITY

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Factoring Malware and Organized Crime in to Web Application Security

An NFC Ticketing System with a new approach of an Inverse Reader Mode

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Comparing Application Security Tools

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Using a Malicious Proxy to Pilfer Data & Wreak Havoc. Edward J. Zaborowski ed@thezees.net

Business through Mobile Phone initiated Near Field Communication

GlobalSign Malware Monitoring

Cloud Storage Security

Malware & Botnets. Botnets

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

Relay Attacks in EMV Contactless Cards with Android OTS Devices

Web Application Security

Current Threat Scenario and Recent Attack Trends

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

Security in Near Field Communication (NFC)

Smart Card APDU Analysis

NFC Mobile Handset High Level Requirements V2

Frequently Asked Questions

Cloud Services Prevent Zero-day and Targeted Attacks

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

CYBERSECURITY INESTIGATION AND ANALYSIS

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Post-Access Cyber Defense

Analysis of advanced issues in mobile security in android operating system

The Mobile Malware Problem

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Learn Ethical Hacking, Become a Pentester

NFC Testing. Near Field Communication Research Lab Hagenberg. Gerald Madlmayr. NFC Research Lab, Hagenberg. E-Smart 2008, Sophia Antipolis

Mobile Device Security: What s Coming Next?

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Protecting against Mobile Attacks

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Loyalty Systems over Near Field Communication (NFC)

Mobile Commerce. Deepankar Roy, Ph.D. National Institute of Bank Management, Pune, India

Detailed Description about course module wise:

Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate

Your Mobile Phone as a Ticket (NFC)

Application Security from IBM Karl Snider, Market Segment Manager March 2012

The Security Risks of Mobile Payment Applications Using Near-Field Communication

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Internet Security. For Home Users

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Easy To Use PDDOS. :Burner Phone DDOS 2 Dollars a day:70 Calls a Min Weston Hecker Security Expert

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Online Payments Threats

Almost 400 million people 1 fall victim to cybercrime every year.

Using Free Tools To Test Web Application Security

NACCU Migrating to Contactless:

Transcription:

Vulnerability Analysis and Attacks on NFC enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan 1

Near Field Communication (NFC) Bidirectional proximity coupling technology NFC devices support three modes of operation Based on 13,56Mhz RFID ISO14443 and FeliCa PCD (read/write), PICC (card emu), peer to peer Standardized data formats on tags NFC Data Exchange Format (NDEF) 2

Introduction NFC phones and services are just being introduced into the public (outside of Japan!) NFC is designed for payment and ticketing Security is essential Current devices and services use passive tags Large scale use in the future because of low price Our work focused on interaction with passive tags 3

Contributions Methods for vulnerability analysis of NFC enabled mobile phones Developed tools for security testing of NFC mobile phones and NFC services Multiple novel attacks against NFC mobile phones and services 4

An NFC Mobile Phone Mobile phone that also integrates NFC chip and antenna and possible a smart card NFC system constantly scans for and reads tags Tag data is processed by either OS functionality or third party application Third party application can take control of NFC functionality for arbitrary use 5

An NFC Mobile Phone Nokia 6131 NFC 6

Analyzing an NFC Mobile Phone Interaction with passive tags (NDEF format) J2ME NFC API (JSR 257) What formats are supported, what can be attacked? Can the API be abused for attacks? System components that can be controlled through NFC Do these components have issues that can be abused through the NFC interface? 7

NDEF Security Toolkit Flexible implementation of the NDEF standard Arbitrary modification of format and data Tag reading/writing, dumping tools Immune against malformed data Test lab version (use with desktop computer) Mobile phone version for analyzing services 8

NDEF Fuzzing Fuzzing is a good choice when testing without access to source code Fuzzing procedure required a human operator Manually moved tag between writer and phone Found multiple vulnerabilities Tested phone crashes and resets 9

NDEF Smart Poster URIs are technical and not suited for the user Smart Poster allows to display information in addition to URI Human readable text Image (optional) URI: sms:+436646606000?body=fahrschein Title: Für Fahrscheinkauf (Eur 1,70) jetzt senden! 10

Smart Poster URI Spoofing Smart Poster display problem Informational text can be used to prevent the URI from being displayed Text can be used to spoof the URI Smart Poster details view can also be manipulated Show innocent looking URI to trick user into opening it! 11

Smart Poster URI Spoofing Attacks Web Browser Load malicious site (URL not displayed on phones) Web based Man in the Middle attack Steal credentials or inject malicious content Mobile Telephony Service Premium rate phone call or SMS 12

Example: Attacking the Mobile Telephony Service Title: Tourist Information\r08005598127634\r\r\r\r\r\r. URI: tel:0900942234711 13

Proof of Concept NFC Worm Push registry allows registration for plain URI App can intercept all tag read events for URI tags Basic idea: writable tags as transport for worm Use URI spoofing to hide the worm install URL Exploit phone's web browser vulnerabilities Silent/automatic install + ask user to run application Spreads by writing URL pointing to itself to tag Worm is activated by phone reading plain URI tag 14

Denial of Service Attacks Destroy trust relationship between customer and the service provider Competitor or prankster Sticky paper tag on top of service provider tag Data on tag causes the NFC phone to crash Paper tag cannot be linked to crash since it looks just like a sticker Attacks found through fuzzing 15

Security of NFC based Services Survey to verify that attacks are practical today All services only use built in functionality Three services surveyed in Vienna, Austria No additional software is installed onto user phones Survey was conducted using a NFC phone running our security toolkit applications 16

Wiener Linien SMS based ticketing (NDEF Smart Poster) Phone number can be spoofed Victim sends SMS to premium rate number 17

Selecta Vending Machines Mobile phone payment via SMS Phone number can be spoofed Payment can be redirect to another machine 18

Vienna ÖBB Handy Ticket Link to online ticket shop URL spoofed for Man in the Middle attack Steal credentials or inject malware 19

Conclusions We showed how NFC mobile phones and services can be analyzed for security Non NFC components also need to be taken into account We introduced a new set of attacks Attacks target both phones and services Attacks can be utilized for fraud, worms, phishing, and Denial of Service 20

Future Work Improve fuzzing process through automation Follow development of NFC New devices and features More complex services 21

Questions? Thank you for your attention! 22