Release date: 2015-05-06

With the stereotype of hackers in people's minds, it is quite easy to identify a person who implements digital crime from the outside. Pale skin, hoodies and laptops, the three characteristics appear at the same time is the most obvious basis for judgment. Of course, this old-fashioned view of the hacker's image is obviously wrong, and may even be rude. The real hackers who invade the business network have a minimum of common sense, they will avoid wearing this old-fashioned clothing, and try to hide their tools.

For those who can tolerate physical pain, bio-hacking, which involves implanting computing devices under the skin, provides a new way to implement covert operations, and can escape physical searches and electronic scans. It is for this reason that Seth Wahle, an APA Wireless engineer who worked as a US Navy sergeant, implanted a chip in his hand, between the thumb and forefinger of his left hand. The part, that is, the tiger's mouth. The chip comes with an NFC (Near Field Communication) antenna that sends a PING (Internet Packet Explorer) command to the Android phone asking it to open a link.

Once the user agrees to open the link and install a malicious file under its guidance, the user's mobile phone will automatically connect to a remote computer, and the user of the computer can perform further on the mobile device. Intrusion command. In short, this Android device was successfully invaded. In a demonstration for Forbes, Val used the security vulnerability detection software Metasploit on his laptop to force an Android device to take a picture of his smile.

201505041000317108.jpg

Security expert Seth Vale sent a malicious link to an Android device through his own NFC chip, and then took a photo of himself with his successful Android device.

At the Miami Miami Conference in May this year, he will showcase the entire process of this hidden invasion with the Secretary of the Council and security consultant Rod Soto. They admit that this is just a rough research experiment, using off-the-shelf tools and known attack techniques in the NFC field, but they claim that this implant-based hacking can be a social engineering toolbox for criminals. "Add a new and useful tool.

At the moment, anyone who is ill-intentioned, even if it is only someone who tests the safety of flight communication systems, will be severely dealt with by airlines and the federal authorities. In such a period, implantable chips provide a clever way to get people through the electronic checkpoints at airports or other security-critical locations. Val said that he also implanted the chip when he was in service with the military. Although he was tested by scanning equipment every day, the chip was never detected. "They (if they want to find this chip) can only scan X-rays for me."

"This implanted chip can bypass many of the security measures deployed today, and we will prove it to everyone," Soto said.

Given that NFC technology is widely used in a variety of industries, implants will provide an effective way to invade different types of networks. Soto warned that placing more complex code on the chip would be more likely to cause more serious damage, especially through the chip for zero-day vulnerabilities (referring to security vulnerabilities that have just been exposed and have not been patched) In the case of an attack.

1.png

Seth Val’s hand, left and right, respectively, before and after he implanted the NFC chip.

However, most implants are not suitable for those who are delicate. Val said that he spent $40 to find an "unlicensed amateur" to help him complete the implant surgery. The needle used for implantation was much thicker than he expected, making him feel sick and vomiting. . He said that due to Florida's strict physical modification regulations, he had to complete the entire surgery through the black market. He had to get the chip to be used. This chip was designed for agricultural use in livestock. It was produced by China's Incentive Electronic Technology Company (the picture below shows their animal products and the large syringe used by Val). ). However, this chip, which is only equipped with 888 bytes of memory and sealed in the Schott 8625 bio-organic glass capsule, is currently not found by security devices, Val said, in front of the camera when making a Skype video call with Forbes. Gently push the cylindrical object.

2.png

Animal-specific implants used by hacker Seth Vale to attack Android devices

3.png

Vale used the needles he used in the $40 black chip implant surgery.

Attack behavior based on implanted devices has some obvious limitations, but this can be overcome by various methods. For example, the malicious files created by Val and Soto for Android will lose their connection with the attacker's server after the phone is locked or restarted.

However, this problem can be solved by installing a software that automatically launches when the phone is turned on and running as a background service, as Wale wrote in a white paper describing such attacks. Since some rogue code has to be manually installed during the invasion, some clever social engineering is also required. Although writing malicious files itself seems to be legal, if you use Google Play's signature and input attachment intrusion instructions to force the installation, you can minimize the incentives needed to actively install the victim. With the trick.

Kevin Warwick, the first person to implant an NFC chip in his body, told Forbes, "It's a good thing to start testing this particular application, because it can make people think about what might happen. The problem and some obvious dangers are understood." In addition, Warwick, now a professor of research cybernetics at the University of Reading in the UK, points out that security systems are powerless to identify such technologies. "Implants like this can't be detected at airports and other places. The metal content is much lower than a watch or a wedding ring worn by people. I used to have nerve implants in 2002. It was a very long platinum wire, and even it was not detected. In fact, there are still some such wires in my arm, and I still travel by plane."

At the hacking conference in Miami, Val and Soto plan to detail all the steps a hacker needs to master the attack tool, including how to get the hardware and how to write the chip. Will this be the beginning of the spread of malicious hacking? Soto said, "This is just the tip of the iceberg... anyone can do that."

Source: Forbes Chinese Network

sardine

Sardine,Frozen Whole Sardines,Frozen Sardines,Frozen Sardine Fish

ZHEJIANG EVERNEW SEAFOOD CO.,LTD , https://www.evernewseafood.com