Skip to main content

Crazy!!! Hacker Implants NFC Chip In His Hand To Hack Android Phones News

There is a very sleek line between hacking and security. The security used to protect the public could be misused by hackers against the public itself, and one shouldn’t forget that with the advance in technology, the techniques used by cyber criminals also improves.


Today, What hackers need to conduct a successful cyber attack?

Maybe just a computing device injected under the skin of their bodies, who can bear the pain, would be enough to help complete a successful cyber attack – also known as Biohacking.

This was exactly what presented by the former U.S. Navy petty officer and now engineer at APA Wireless Seth Wahle.


With no malicious intention, Wahle implanted a small NFC chip in his left hand right between his thumb and his pointer finger in order to display the risks of Biohacking.

Hacking Android devices using NFC implants:

For those unaware, NFC (Near Field Communications) chips embedded in our smartphone devices are used for transferring files and in various mobile payment applications.

Wahle's chip has an NFC antenna that is capable to hack Android devices and bypass almost all security measures. The chip can ping a nearby Android smartphone, prompting its user to open a link.

Once the user of the smartphone agrees to open that link, the link installs a malicious piece of software on the phone that allows the phone to connect to a remote computer controlled by the hacker.

The hacker would now be able to carry out further exploits on the victim's device, potentially putting all the important information and sensitive data of victim at risk.

How is NFC implant done?

In order to implant the NFC device, Wahle bought a chip designed to be injected into cattle and implanted the chip by an "unlicensed amateur" for $40 by using a needle which was larger than he had initially expected, Wahle told Forbes during a Skype call.

The worst part about NFC implant:

The chip implant into Wahle hand was almost invisible after few days. The major thing to worry about this technique is that the NFC chip goes completely undetected in almost all kinds of security measures, including the security checkpoints in airports and other high-security locations.

Wahle said that with the chip implanted in himself, he went through daily scans prior to leaving the military and the chip was never detected. But, he also notes that the X-rays would be able to detect the chip.

However, these Implantable NFC chips potentially open up a smart way for hackers to hack Android devices and networks and gain access to victims' sensitive information.
"This implanted chip can bypass pretty much any security measures that are in place at this point and we will show proof of that," said Rod Soto, the event’s secretary of the board and security consultant.
Limitations of the attacks:

There are some limitations to methods like this, as Wahle says that the remote connection made by a hacker to the server can only be kept if the affected Android device is not locked or rebooted.

However, these limitations could be overcome by various means. Like if, say, the affected phone is rebooted, a software run as a background service that starts on boot would fix the problem.

Wahle will be presenting his finding at the Hack Miami conference taking place this May, with Rod Soto. Both of them intended to alert about these latest strategies that can be used by hackers to hack terminals and networks.

They also admitted that this NFC implant-based attack could provide hackers and cyber criminals with a particularly useful "tool in their social engineering toolset."

For More Updated News Stay Connected 
LIKE US ON FACEBOOK

Comments

Popular Posts

Create Your Own Social Networking Site

Create Your Own Social Networking Site JCOW: Ethical Hacking Top 10 reasons to choose Jcow:- 1. Handle more traffic - Clean codes and Dynamic caching can lower the CPU load and  speed up your website. 2 Make your site more interactive - Well designed Jcow applications help you members to connect and communicate with others more effectively. 3 Add questions to the Registration Form - You can add new member fields, which will be displayed to the registration form, profile form, and the member browsing form. 4 Easily share stuff - Within the AJAX sharing Box, your members can publish status,  photos, videos, and blogs. 5 Customize and Extend your Jcow Network - A Jcow network consists of core apps(like "Friends" and "Messages") and optional apps(like "Blogs" and ""Videos"). You can enable/disable optional apps. You can also develop your own apps. 6 Every profile could be Unique - Members can customize their own profile theme and  add music play...

WRITE "I LOVE YOU" ON CMD BY USING NOTEPAD

I had previously posted about   Matrix effect   using Notepad   as well as cool batch file  programs. In this post i will share with you guys  the cool and awesome  Notepad Tricks .  As name suggest you don't require any program other then Notepad.  So lets get started. 1. Open  Notepad   and copy below code. @echo off color 0A :A echo IIIIIII     L      OOOOOO V           V  EEEEEE     Y       Y  OOOOOO  U     U  ping -a .9 >nul echo    I        L      O    O  V         V   E           Y     Y   O    O  U     U  ping -b .9 >nul  echo    I        L      O    O   V       V    E   ...

HL7V2.x to HL7V3.0 Translation Issues Details-2

In continuation of my previous post this post lists the other issues associated with HL7 v2.x to HL7v3 translation Conformance Patterns: The other major issue with the transformation of messages is the behavior of application when a particular information exchange takes place. In HL7V3.0 apart from the trigger events and interactions there exists the notion of application role as senders and receivers. The application role is characterized as the entire set of interactions for which the sender and receiver are responsible for transmitting. HL7V3.0 clearly defines the possible interactions and the application behavior associated these interactions in the form of responses for which the sender and receiver needs to adhere to. The differences in messages between V2.x and V3.0 and absence of clear guidance on V2.x regarding application behavior on receipt of message makes the transformation exercise more difficult. Vocabulary: It is a well known fact that 80% of HL7 V2.x message failu...