SEARCH
SHARE IT
While cash once dominated as a payment method, more consumers than ever are now using their mobile e-wallet as a contactless payment system for their purchases, replacing credit cards or e-tickets.
With smartphones increasingly relying on Near Field Communication (NFC) technology for convenience and connectivity, cybersecurity experts are warning of a growing threat, the breach of NFC tags. This tactic, which often goes unnoticed, can expose users to phishing attacks, malware and data theft through a simple contact with their phone.
"NFC technology is extremely practical, but it can be a vector for malicious activity if users are not careful," warns Marc Rivero, chief security researcher at Kaspersky. "Seemingly innocent tags in public places can be reprogrammed or replaced for harmful purposes. As the use of NFC expands into areas such as payments, public transport and marketing, we expect the malicious tactics of perpetrators to evolve further. In the coming years, thousands of users worldwide may be targeted by NFC-related attacks, particularly in urban areas where its use is widespread. Awareness and prevention measures are key to reducing these risks."
NFC tags are widely used in advertising campaigns, public transport systems and smart home systems, offering fast and contactless interaction. However, it is precisely this convenience that makes them vulnerable to hacking by malicious users.
One of the methods they use involves reprogramming legitimate NFC tags. When left unlocked, these tags can be modified to redirect users to phishing sites, perform unintended actions on their devices or even spread malware. Another method is to physically replace the original NFC tags. For example, attackers may replace a genuine tag with a malicious one, for example on a public sign or in a booth in high-traffic areas such as transport hubs, cafes or shops.
The consequences of interacting with a malicious NFC tag can be severe. Among the most common consequences are phishing attacks, in which users are redirected to fake websites designed to steal personal or login information. By exploiting vulnerabilities in the mobile NFC reader sensor, attackers can execute malicious code and undermine the security of the device. Malicious NFC tags can also result in the download of apps or files containing malware, which can steal data, track activity or damage the device. The seemingly trivial act of scanning a compromised NFC tag can lead to significant financial and privacy implications.
To stay safe, users are advised to adopt these simple but effective measures:
Organizations using NFC technology should take proactive measures to secure their systems and protect their users:
MORE NEWS FOR YOU