Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Mobile & Wireless

Galaxy S3 Hacked Via NFC During Mobile Pwn2Own

Researchers from MWR Labs unveiled a zero-day attack against a Samsung Galaxy S3 smartphone last week during EUSecWest, which leveraged the device’s Near Field Communication (NFC) connection to gain full control over it.

Researchers from MWR Labs unveiled a zero-day attack against a Samsung Galaxy S3 smartphone last week during EUSecWest, which leveraged the device’s Near Field Communication (NFC) connection to gain full control over it.

While admittedly the NFC aspect was used for showmanship, the fact that it works means that anyone with a Galaxy S3 who happens to walk past an attacker is vulnerable to an attack. The limitation here is that the devices need to be in close proximity, but that is overcome in crowded areas or simply by bumping the intended victim.

Samsung Galaxy S3 SmartphoneIf successful, then that person’s SMS message database, pictures, email, and address book can be compromised. The attacker needs only upload the data to a remote server. In addition, the vulnerability yields total control, so it is possible to use it to call toll numbers.

“MWR showed an exploit against a previously undiscovered vulnerability on a Samsung Galaxy S3 phone running Android 4.0.4. Through NFC it was possible to upload a malicious file to the device, which allowed us to gain code execution on the device and subsequently get full control over the device using a second vulnerability for privilege escalation. The same vulnerability could also be exploited through other attack vectors, such as malicious websites or e-mail attachments,” MWR Labs explained in a statement.

“Android 4.0.4 has many of the exploit mitigation features that are common to desktop Linux distributions, including Address Space Layout Randomisation (ASLR) and Data Execution Prevention (DEP). Shortcomings in these protections allowed us to leverage the control we had of the device to trigger the second vulnerability.”

A full report on the vulnerability will be released once Samsung has had time to prepare a fix. The flaw is also found in the Galaxy S2. For their work, MWR Labs walked away with a $30,000 prize. ZDI has taken possession of the exploit, and intends to disclose the specifics to Samsung.

In related news, Corey Benninger and Max Sobell of the Intrepidus Group were able to use NFC-enabled phones (Samsung Nexus devices) running a custom Android application to get free transit credits.

As part of their demo, it too given at EUSecWest, they explained how two cities using the MiFare Ultralight system had vulnerable NFC-enabled transit ticketing systems. While not all systems are vulnerable, the pair explained, the ones tested in New Jersey and San Francisco were.

Advertisement. Scroll to continue reading.

“We know a number of cities are looking to roll out contactless technology and hope we can bring light to this issue so that it is implemented correctly in the future. One of the items we also raised in our talk is that full card emulation on smartphones is likely to happen soon. When this does, it could cause a number of NFC based access control systems to be re-evaluated,” they noted in a blog post. 

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.