Vulnerabilities / Threats

10:22 PM
Connect Directly

'Debit Or Credit' Becomes A Point-Of-Fail

Target's massive breach of payment cards and other retailer security incidents have stirred debate on alternative payment options at the register

The only way to avoid falling prey to cybercriminals trolling for your payment card information these days is to throw down cold hard cash or swipe a prepaid plastic cash card at the register. But carrying around wads of cash is obviously neither safe nor convenient, and buying prepaid cards has transaction and convenience challenges of its own.

Target's record-breaking data breach revealed in December was an eye-opener for major retailers and consumers as lawmakers and retail industry executives are now rethinking how to better secure card payment systems and processes. Alternative options to today's vulnerable magnetic striped plastic – namely chip-and-PIN payment cards -- also are getting more attention than ever in the U.S. as the reality sets in on the potentially billion-dollar fines that Target ultimately could face. It's also very likely that there's more pain to come, with other retailers that have suffered the same fate and not yet come forward. Neiman Marcus and Michael's so far are the only major vendors that have reported breaches in the wake of Target's announcement.

"Banks have gone out of their way to make [consumers] feel comfortable. They're just charging the retailers for this, but it's going to hurt the retail industry," says Avivah Litan, distinguished analyst with Gartner. "Maybe banks will now move on chip-and-PIN" sooner, she says.

Retailers have been in the bull's eye of attackers for some time now. The retail industry was the No. 1 target of data breaches in 2012, according to Trustwave's data breach investigations report, accounting for 45 percent of its breach investigations that year. Payment card information was the top type of data attackers were after in the breaches.

But the past few months of new twists to Target's breach trickling out, as well as worries of another big retail shoe dropping next, may help push electronic payment technology into a new more secure generation. "The real technologies we need don't exist yet," says Adam Kujawa, malware intelligence manager for Malwarebytes. Kujawa says, ideally, smart cards that can automatically change credit card account numbers, for example, would keep accounts more secure and eliminate the need for expensive card replacements like Target has had to do. So in the meantime: debit, credit, or paper check at the register?

Security experts maintain that the debit card is most vulnerable because it's directly tied to the customer's bank account. Debit-card payment has become wildly popular for convenience reasons, but it's also very convenient for a cybercriminal who scrapes a debit card account number and PIN and gets a door into the bank account.

But because banks typically cover losses to a consumer's account, the reality of that type of breach often goes unnoticed by the victim, who merely gets his or her account credited for any fraudulent charges or withdrawals, and is then issued a brand-new card.

Some consumers kick it old school and write paper checks rather than risk their debit card account getting pilfered. But paper checks not only are less convenient, but they also come with security weaknesses of their own. The check may not be on the hit list of an Eastern European cybercrime ring, but you have to rely on the trust of the cashier who handles the check, as well as the retailer when it stores and ultimately presents it to the bank for payment.

"With checks, the most obvious thing is the account number is unencrypted on the check," says BC Krishna, president and CEO of MineralTree, a provider of secure business payment tools. The customer's bank account and routing numbers are printed on a check: "That opens a massive amount of opportunity" for a nefarious merchant to pilfer that information, he says.

While check fraud may sound like an antiquated term in today's rampant electronic payment world, it's still common today. According to the American Bankers Association's 2013 account fraud survey, 54 percent of fraud loss came from debit card fraud and 37 percent from check fraud. Online banking and electronic transfer fraud accounted for 9 percent, the report says.

"I wish I could say this is safer than that. The reality is both [debit card and paper check] have vulnerabilities, and fraudsters are constantly exploiting those vulnerabilities in really creative ways," Krishna says.

There's always the credit card, which continues to be a major target of cybercriminal gangs, but with little to no risk to the consumer of financial liability. "One of the reasons to use credit cards instead of debit cards is that a debit card hits your bank account and a credit card hits your credit line as opposed to your cash. So you have a little time to go after the bad guys," too, Krishna says.

Prepaid cash cards from Visa, meanwhile, offer privacy and the convenience of cash, but can be tricky to manage.

[Retailers have been infected with a family of malware that stole payment card and personal information from some 50,000 customers. See Point-Of-Sale System Attack Campaign Hits More Than 40 Retailers.]

Next-Generation Payment Options Chip-and-PIN technology is likely the next generation of payment cards: It's already well-established in Europe, but the U.S. has been slow to adopt it. These cards contain an embedded microchip, with a PIN code as the authentication method rather than the magnetic strip and signature used in most payment cards in the U.S. today.

The U.S. retail industry has an October 2015 deadline for adopting chip-and-PIN cards, also called Europay-Mastercard-Visa (EMV). But the standard doesn't require the use of PINs to protect data on the cards, which some experts say basically defeats the purpose of the stronger card technology.

Another option is to get rid of the card altogether, Malwarebytes' Kujawa says. "Instead, banks could simply configure thumbprints or something else physical of customers to act as their own 'account number,'" he says.

Authentication would require three factors: something you are, possibly a thumbprint or other identification; something you know, such as a static passcode; and something you have, such as a one-time passcode that syncs with the payment server at the retailer or bank, he says.

"With all three of these securities put in place, the only way I could see an attacker compromising the purchase is if they hijacked the encrypted connection somehow and forced the POS system to authenticate with a rogue payment server, sending the money to the attacker instead of the organization," Kujawa says. "Though there would have to be a serious vulnerability in the communication systems for that to happen."

But these are still fairly futuristic options, Kujawa says. "This is, of course, more of the direction I hope to see the future of banking, for the time being I think for the truly paranoid, use prepaid cards," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
2/13/2014 | 10:38:39 PM
re: 'Debit Or Credit' Becomes A Point-Of-Fail
pre-paid cash? so you loose all your money when those get hacked, with absolutely no chance of anyone refunding it. mad idea.
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.