Android Bug Lets Hackers Plant Malware Via NFC Beaming (zdnet.com) 14
An anonymous reader quotes a report from ZDNet: Google patched last month an Android bug that can let hackers spread malware to a nearby phone via a little-known Android OS feature called NFC beaming. NFC beaming works via an internal Android OS service known as Android Beam. This service allows an Android device to send data such as images, files, videos, or even apps, to another nearby device using NFC (Near-Field Communication) radio waves, as an alternative to WiFi or Bluetooth. Typically, apps (APK files) sent via NFC beaming are stored on disk and a notification is shown on screen. The notification asks the device owner if he wants to allow the NFC service to install an app from an unknown source. But, in January this year, a security researcher named Y. Shafranovich discovered that apps sent via NFC beaming on Android 8 (Oreo) or later versions would not show this prompt. Instead, the notification would allow the user to install the app with one tap, without any security warning.
The CVE-2019-2114 bug resided in the fact that the Android Beam app was also whitelisted, receiving the same level of trust as the official Play Store app. Google said this wasn't meant to happen, as the Android Beam service was never meant as a way to install applications, but merely as a way to transfer data from device to device. The October 2019 Android patches removed the Android Beam service from the OS whitelist of trusted sources. However, many millions of users remain at risk. If users have the NFC service and the Android Beam service enabled, a nearby attacker could plant malware (malicious apps) on their phones. Since most newly-sold devices have the NFC feature enabled by default, you'll have to disable Android Beam and NFC or update your phone to receive the October 2019 security updates if you want to protect yourself from this bug.
The CVE-2019-2114 bug resided in the fact that the Android Beam app was also whitelisted, receiving the same level of trust as the official Play Store app. Google said this wasn't meant to happen, as the Android Beam service was never meant as a way to install applications, but merely as a way to transfer data from device to device. The October 2019 Android patches removed the Android Beam service from the OS whitelist of trusted sources. However, many millions of users remain at risk. If users have the NFC service and the Android Beam service enabled, a nearby attacker could plant malware (malicious apps) on their phones. Since most newly-sold devices have the NFC feature enabled by default, you'll have to disable Android Beam and NFC or update your phone to receive the October 2019 security updates if you want to protect yourself from this bug.
Doesn't really allow someone to "plant malware" (Score:4, Informative)
The phone user still has to tap on a notification to say "install"... the missing security warning isn't great, but it seems like a pretty low threat.
Re: (Score:3)
Re: (Score:3, Funny)
Unfortunately most users are complete idiots. Especially if you name the hack something like "Android Security Update".
OH SHIT.
Re: (Score:3)
Not just users but developers - i'll put 10$ down that whomever did the NFC beaming just grabbed the old Bluetooth Beaming code from the 90's and added to it.. because this is the exact same crap just with a different protocol....
Re: (Score:2)
And it's NFC, so you have to basically put your phone on someone else's phone - and they also have to be at the "send this file or app to someone else via NFC" stage on their phone for this to work.
And then you have to tap a button to install said app on your phone.
So..... is this a big deal, really?
I just keep it off (Score:2)
Re: (Score:2)
Even if you have it on, Android turns it on when the phone is locked. An attacker would have to wait until you had your phone unlocked, then get really close to you to transfer it and hope you press the install button
Re: (Score:2)
An attacker would have to wait until you had your phone unlocked, then get really close to you to transfer it and hope you press the install button
Uhh, why wait for you? If they're NFC close to your unlocked phone, they can press it themselves. With their nose even.
What Updates? - Unrepairable phones (Score:1)
Re: What Updates? - Unrepairable phones (Score:1)
Geek Squad Tech (Score:1)