• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Former US Army member confesses to Telecom hack and extortion conspiracy

 | 

CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025

 | 

DDoS peaks hit new highs: Cloudflare mitigated massive 7.3 Tbps assault

 | 

U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

 | 

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

 | 

Belk hit by May cyberattack: DragonForce stole 150GB of data

 | 

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

 | 

FBI seized multiple piracy sites distributing pirated video games

 | 

An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distance

 | 

Interlock ransomware group deploys new PHP-based RAT via FileFix

 | 

Global Louis Vuitton data breach impacts UK, South Korea, and Turkey

 | 

Experts uncover critical flaws in Kigen eSIM technology affecting billions

 | 

Spain awarded €12.3 million in contracts to Huawei

 | 

Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb

 | 

Wing FTP Server flaw actively exploited shortly after technical details were made public

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 53

 | 

Security Affairs newsletter Round 532 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

McDonald’s job app exposes data of 64 Million applicants

 | 

Athlete or Hacker? Russian basketball player accused in U.S. ransomware case

 | 

U.S. CISA adds Citrix NetScaler ADC and Gateway flaw to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Digital ID
  • Hacking
  • 32M is about to become the first in the US to implant a microchip to employees volunteers

32M is about to become the first in the US to implant a microchip to employees volunteers

Pierluigi Paganini July 25, 2017

The Wisconsin company Three Square Market (32M) is about to become the first in the U.S. to implant microchip to its voluntary employees.

In April 2015, the security researcher Seth Wahl implanted an NFC Chip in his hand to bypass security scanners in a high-security environment and exploit Android mobile devices.

microchip

Wahle used the NFC chip to ping nearby Android mobile devices in the attempt to establish a direct connection.

Once established a link, the attacker can serve a malicious file that once executed by the victims could allow compromising the device. The infected phone then connects a remote server operated by Wahle, who can deliver further malicious payloads and exploits the on the mobile device (i.e. Metasploit).

This kind of attack could be very dangerous in case the attacker uses sophisticated as efficient social engineering scheme. Implanted NFC chip could easily allow bypassing perimeter defense in high-security environments, even if IoT devices (i.e. wearables devices) are not allowed.
Wahle explained that none of the military scanners he had to pass through every day while he was serving US military, was able to detect the implant.

An implanted chip could be used for many ordinary operations, such as opening a door or authorizing a bank wire transfer.

Now the US Marketing solution provider Three Square Market (32M) has announced that it will implant microchips in voluntary employees.

The firm announced it had partnered with the Swedish biohacking firm BioHax International for offering implanted microchips to all their employees starting from August 1st.

“It’s the next thing that’s inevitably going to happen, and we want to be a part of it,” Three Square Market (32M) CEO Todd Westby told KSTP.

Three Square Market is a leader in micro market technology, it designs stores using a self-checkout kiosks.

In the official announcement, the company claims it will be the first U.S. company to offer microchip implants to its employees.

The company aims to involve at least 50 employees in the futuristic programme.
The implanted chip will allow employees to purchase market kiosk items, open the doors, and log onto their computers, anyway, the device doesn’t implement a GPS tracking feature.

They chip are implanted between the thumb and forefinger, Westby highlighted that the data is encrypted and is managed in a secure way.

The chips will also use near-field communications (NFC) along with radio-frequency identification (RFID).

According to the company, the implanted chips would allow its employees to log into their office computers, pay for food and drink from office vending machines, open doors and use the copy machine, among other purposes.

“We foresee the use of RFID technology to drive everything from making purchases in our office break room market, opening doors, use of copy machines, logging into our office computers, unlocking phones, sharing business cards, storing medical/health information, and used as payment at other RFID terminals,” Westby said.

“Eventually, this technology will become standardised allowing you to use this as your passport, public transit, all purchasing opportunities, etc.”

While the company is about to become the first in the US to implant microchips to its employees, some European companies already made it such as the Swedish company Epicenter.

Hackers, the next move is yours!

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs –  (microchip , RFID)

[adrotate banner=”13″]


facebook linkedin twitter

biohacking microchip NFC RFID Three Square Market

you might also like

Pierluigi Paganini July 16, 2025
Former US Army member confesses to Telecom hack and extortion conspiracy
Read more
Pierluigi Paganini July 16, 2025
CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Former US Army member confesses to Telecom hack and extortion conspiracy

    Cyber Crime / July 16, 2025

    CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025

    Hacking / July 16, 2025

    DDoS peaks hit new highs: Cloudflare mitigated massive 7.3 Tbps assault

    Security / July 16, 2025

    U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 16, 2025

    Android Malware Konfety evolves with ZIP manipulation and dynamic loading

    Malware / July 15, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT