Endpoint
7/3/2012
04:06 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

PIN Pads Put Millions At Risk, Researchers Say

Payment terminals handled more than 852 million card payments in the U.K. alone in April 2012

Payment terminals, known as PIN Pads, are putting hundreds of millions of consumers worldwide at risk everyday a British IT security company is warning.

Click here for more of Dark Reading's Black Hat articles.

The terminals, which are used by retailers, handled more than 852 million card payments in the UK alone in April 2012 according to the UK Cards Association.

Researchers at MWR InfoSecurity have found that the terminals are not secure and codes can be introduced by malicious smartcards that will then allow criminals to have access not only to a customer’s PIN and PAN (Primary Account Number shown on the front of a plastic card) numbers but also gain access to the merchant’s network.

“Our research shows security of PIN Pads is below that which consumers should expect for transactions of this nature. The security employed in the software is not up to the job for such sensitive transactions, leaving the devices open to many forms of attack”, said Ian Shaw, Managing Director of MWR InfoSecurity.

“As a result of this, a sophisticated attacker may be able to compromise these terminals to the extent that it would be very difficult to identify if they had been breached.”

“Our investigations have shown that the range of vulnerabilities found in these devices, now part of the everyday shopping experience, could compromise consumers’ card details and PIN numbers. It may also leave merchants unprotected and cause serious disruption to their businesses, potentially exposing both of them to serious fraud”, he added.

For example, a customer at a restaurant could pretend to be making a payment with a “Trojan card” but instead has gained access to the payment terminal. From that point onwards, all pin numbers and other card holder information that passes through that terminal can be gathered by the criminal. They can then take advantage of a number of existing communication channels, such as Internet connection –Wireless, Bluetooth, mobile networks– or phone lines to retrieve that information. Alternatively, the criminal could return and insert again the malicious smartcard to collect the recorded data from the payment device.

“Generally, efforts are being directed to securing the PIN Pads physically but the software installed in the terminals remains highly vulnerable. Even the typical consumer smartphone deploys more security features than the technology used in these devices”, said Ian Shaw.

MWR InfoSecurity has been carrying out research on payment terminals that exchange information with this type of card and has found an alarming range of weaknesses shared by vendors of these devices in UK.

The firm has contacted the vendors and has shared their discoveries with them but at the moment is not able to provide any further details in an effort to prevent criminals from taking advantage of the situation.

“We need to work together with the vendors so that the problem is dealt with quickly”, concluded Shaw.

However, MWR believes this is very serious issue and will be highlighting a number of vulnerabilities it has identified and demonstrating its findings at the Black Hat security conference in Las Vegas on July 25th.

MWR InfoSecurity supplies services which support clients in identifying, managing and mitigating their Information Security risks.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web