VISA Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/visa/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Mon, 17 Apr 2023 21:48:34 +0000 en-US hourly 1 https://wordpress.org/?v=90646 200474804 Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card https://gridinsoft.com/blogs/payments-from-a-locked-iphone-with-apple-pay-and-a-visa-card/ https://gridinsoft.com/blogs/payments-from-a-locked-iphone-with-apple-pay-and-a-visa-card/#respond Thu, 30 Sep 2021 19:44:35 +0000 https://blog.gridinsoft.com/?p=5973 Scientists talked about how to make fraudulent payments using Apple Pay with a Visa card on a locked iPhone. This scam works over the air, even if the iPhone is in your bag or pocket, and has no limit on the number of transactions. A report on this issue [PDF] will be presented at the… Continue reading Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card

The post Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card appeared first on Gridinsoft Blog.

]]>
Scientists talked about how to make fraudulent payments using Apple Pay with a Visa card on a locked iPhone. This scam works over the air, even if the iPhone is in your bag or pocket, and has no limit on the number of transactions. A report on this issue [PDF] will be presented at the IEEE 2022 Symposium.

Their research was published by the University of Birmingham and the University of Surrey, who found that the iPhone can confirm almost any transaction under certain conditions. Typically, for the payment to go through, the iPhone user needs to unlock the device using Face ID, Touch ID, or a passcode. However, in some cases this is inconvenient, for example, when paying for public transport fares. For such cases, Apple Pay provides Express Transit, which allows making transactions without unlocking the device.

Express Transit, for example, works with transport turnstiles and card readers that send a non-standard byte sequence bypassing the Apple Pay lock screen. The researchers say that in combination with a Visa card, “this feature can be used to bypass the Apple Pay lock screen and make illegal payments from a locked iPhone, using any EMV reader, for any amount and without user authorization.”

payments with Apple Pay and Visa

For example, experts were able to simulate a transaction at the turnstile using a Proxmark device that acts as a card reader, which communicated with the target iPhone, as well as an Android smartphone with NFC, which communicated with the payment terminal.

In essence, this method is a replay and relay MitM attack in which Proxmark plays back iPhone magic bytes to trick the device into believing it is a transaction at the turnstile, so no user authentication is required to authorize the payment.

The attack works by first replaying the ‘magic bytes’ for the iPhone in a way that it believes is a transaction with an EMV reader in the transport. Then, when relaying EMV messages, it is necessary to change the Terminal Transaction Qualifiers (TTQ) transmitted by the EMV terminal in such a way as to set the bits (flags) for Offline Data Authentication (ODA) for Online Authorizations and the corresponding supported EMV mode.the authors of the report say.

Digging deeper into the problem, the researchers found they could change the Card Transaction Qualifiers (CTQ), which are responsible for setting limits for contactless transactions. Thus, it was possible to trick the card reader so that the authentication on the mobile device was successfully completed.

As a result of the experiments, the researchers were able to make a transaction of £1000 from a locked iPhone, and successfully tested such an attack on the iPhone 7 and iPhone 12.

At the same time, it is noted that the tests were successful only with iPhone and Visa cards (in the case of Mastercard, a check is performed to make sure that the locked iPhone carries out transactions only with card readers, for example, in transport). By examining Samsung Pay, the researchers concluded that transactions with locked Samsung devices are possible, but the value is always zero, and transportation providers charge tolls based on the data associated with these transactions.

Experts say that they submitted their findings to Apple and Visa engineers in October 2020 and May 2021, but the company still has not fixed the problem.

Our discussions with Apple and Visa have shown that both parties are partially to blame, but neither of them is willing to take responsibility and implement a fix, leaving users vulnerable indefinitely.the study authors say.

Visa officials told Bleeping Computer the following:

Visa cards connected to Apple Pay Express Transit are secure and cardholders can continue to use them with confidence. Variants of contactless fraud schemes have been studied in laboratory conditions for more than ten years, but have been found unsuitable for large-scale implementation in the real world.

Let me remind you that I reported that Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards.

The post Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/payments-from-a-locked-iphone-with-apple-pay-and-a-visa-card/feed/ 0 5973
Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards https://gridinsoft.com/blogs/scientists-have-developed-an-attack-that-allows-not-to-enter-a-pin-code-while-paying-with-visa-cards/ https://gridinsoft.com/blogs/scientists-have-developed-an-attack-that-allows-not-to-enter-a-pin-code-while-paying-with-visa-cards/#respond Mon, 31 Aug 2020 16:57:46 +0000 https://blog.gridinsoft.com/?p=4240 Scientists from the Swiss Higher Technical School of Zurich have developed an attack that allows not to enter a PIN code when making contactless payments with Visa Credit, Visa Electron and VPay cards. This attack allows an attacker who owns the details of a stolen contactless Visa card to use the card to pay for… Continue reading Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards

The post Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards appeared first on Gridinsoft Blog.

]]>
Scientists from the Swiss Higher Technical School of Zurich have developed an attack that allows not to enter a PIN code when making contactless payments with Visa Credit, Visa Electron and VPay cards. This attack allows an attacker who owns the details of a stolen contactless Visa card to use the card to pay for high-value goods, whose price is much higher than the limit of contactless transactions. And an attacker doesn’t need a PIN.

A report describing this attack technique has already been published in the public domain, and experts intend to arrange a full presentation of their research at the IEEE symposium, which will be held in May 2021.

“The attack they invented is very difficult to detect because the attacker would be like a regular customer who pays for a purchase using a smartphone. In reality, the attacker will pay with a stolen contactless Visa card, which is hidden somewhere on his body”, – say the scientists.

This attack does not require sophisticated equipment, only two Android smartphones, a special app created by the research team, and the contactless card itself. At the same time, the application installed on both smartphones will work as an emulator of a PoS terminal and an emulator of the card itself.

not enter PIN-code for VISA

As a result, the attack looks like this: a smartphone that imitates a PoS device is placed next to a stolen card, and a smartphone that acts as a card emulator is used to pay for goods. The idea is that the PoS emulator asks the card to make a payment and modifies the transaction details, and then transmits the changed data via Wi-Fi to the second smartphone, which ultimately makes a large payment without having to enter a PIN code (after all, the attacker changed the transaction data in this way to not require PIN entry). A demonstration of the attack can be seen below.

Our application does not require rooting or any clever Android hacks. We have successfully tested it on regular Pixel and Huawei devices”, — write the researchers.

If we talk about the technical side of the issue, such an attack is possible due to the design flaws of the EMV standard and the Visa contactless protocol. These bugs allow an attacker to modify the contactless transaction data, including those fields that are responsible for transaction details and the need to verify the cardholder.

Essentially, the attacker informs the terminal that PIN verification is not required, and that the cardholder has already been verified on a consumer device (for example, a smartphone). Moreover, these modifications are carried out on the smartphone where the PoS emulator is running and are performed before being sent to the second smartphone. That is, already changed information is transmitted to the real PoS device, and it cannot determine whether the details of the transaction have been modified.

To find these problems, the researchers used a modified version of a tool called Tamarin, which was previously used to detect complex vulnerabilities in the TLS 1.3 cryptographic protocol (PDF), as well as in the 5G authentication mechanism (PDF).

Using the same tool, experts identified another potential problem that affects not only Visa but also Mastercard. The researchers did not conduct field tests of this bug for ethical reasons.

Here’s how the experts describe the second problem:

Also, our symbolic analysis revealed that during an offline contactless transaction using a Visa card or an old Mastercard, the card is not authenticated with the terminal through ApplicationCryptogram (AC) – a cryptographic proof of the transaction created by the card that the terminal cannot verify (only the card issuer can) … This allows attackers to trick the terminal into accepting an invalid offline transaction. Later, when the acquirer adds the transaction data to the clearing record, the issuing bank will find the wrong cryptogram, but by that time, the criminal has long disappeared along with the goods”.

Let me remind you that I also talked about the interesting SpiKey technique that allows opening the lock by recording a sound of a turning key. Moreover, soon will be produced a real hackers Tamagotchi. Do you already feel your own defenselessness in the new digital world?

The post Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/scientists-have-developed-an-attack-that-allows-not-to-enter-a-pin-code-while-paying-with-visa-cards/feed/ 0 4240