Black Hat Europe Q&A: Exposing the Weaknesses in Contactless PaymentsBlack Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments
Researchers Leigh-Anne Galloway and Tim Yunusov chat about their work testing Visa’s contactless payments security system vulnerabilities.
November 20, 2019
Countless financial transactions are conducted every day by customers using contactless payment systems, and next month two security researchers from Positive Technologies will show Black Hat Europe attendees how vulnerable those transactions are to bad actors.
In their Black Hat Europe Briefing on First Contact - Vulnerabilities in Contactless Payments researchers Leigh-Anne Galloway and Tim Yunusov will show how they successfully bypassed (among other things) Visa’s £30 limit on contactless payments made via physical card in the United Kingdom. They’ll also demonstrate a few critical weak points in contactless payments, including flaws in key generation values and unpredictable numbers.
I recently chatted with the pair about their work, what they’ve learned, and why it’s so important.
Alex: What do you hope to accomplish by giving this talk at Black Hat Europe?
Leigh-Anne: There are probably two outcomes that we'd like. The first is that payment security is a very under-subscribed area, so by talking at a venue like Black Hat, we're hoping to interest other researchers in payments. There are incredibly high barriers, or at least it seems that way from the outside. But we want to show people that it is possible to work in this area.
Secondly, one thing we noticed is that even though we have this big growth in the financial sector, over the last year we've seen all these digital-only "neo-banks" spring up, and at the same time payments are being monopolized at the highest level. If you look under the surface of these new digital banks, a lot of them sit on the infrastructure of existing financial institutions, like other brick-and-mortar banks. And if you go higher up the levels of the payment infrastructure, it becomes more and more like a monopoly.
So when you don't have much competition, you stagnate in terms of standards. That means that people like Visa and MasterCard can dictate how they want to work and how they want to operate in the marketplace, and no one else regulates them, because they are the regulators of everyone else.
Alex: A Visa rep was quoted in a Forbes article responding to your research by suggesting it wasn’t a threat worth addressing. How do you feel about that response?
Leigh-Anne: Visa and MasterCard have slightly different stances on how they approach things; it is rather infuriating, and I would imagine that some of the banks feel a bit similar, because it's them saying "we can't be bothered to do anything about that," whereas if you reported a security issue to a big corporation like Google, even if the issue wasn't so significant, they'd probably resolve it rather than saying "we don't want to do anything about it, go on your way."
For example, there isn't a formalized set of processes in the payment sector to deal with these things in the way that we see in bug bounty programs elsewhere, where you would formalize a process for how to categorize the risk of security issues, and how to resolve them.
But their stance is actually ... in a lot of cases Visa says, based on their own data (though they don't provide any clarity on what that data is) they say, "based on our own data, we don't see applications of this attack in the wild, and therefore we're not going to do anything about it."
When we look at this idea [banks promote] that contactless payment systems have resulted in fraud reduction, you find really different views. Visa just published a statement, at the same time that we released information about our research, to say that they had a 40% reduction in fraud in contactless payments over the last two years. But if you look at the footnote, it says the source is just "Visa data" and there's no explanation of the actual source.
If we look at data in the UK, if we look at the actionable data collected by the police, which is probably going to be on the conservative side because a lot of fraud doesn't get reported to police, there are some significant losses. So it's really hard to know what's going on.
Alex: What are you hoping Black Hat Europe attendees will get out of your talk?
Leigh-Anne: In plain language, I always try to think of payments as something everyone interacts with every day, but yet we have very little knowledge about how they work. So with the work that we do, and the presentation we're giving, we're hoping to remove some of that mystery and encourage people to get involved in this area, because it is massively undersubscribed, and there is a lot of work to be done.
Do you think more financial institutions should be implementing bug bounty programs, the way many tech companies do?
Leigh-Anne: I think it could be helpful. I think there's a different view among some of those newer banks, the neobanks, where we're finding some of them have adopted a bug bounty approach. But most of them don't have any sort of formal framework. And if you look at the larger institutions, like HSBC, if you want to report a security issue to them, it's almost impossible to work out how to do that.
I remember actually contacting customer services on chat and they said, "Oh you can just tell us, and we'll pass along the information," which isn't the appropriate way to share that information. But these are some of the challenges that we face. So I think it would probably accelerate a security standard. I mean of course the financial industry is pretty heavily regulated, but those standards don't necessarily correlate strongly with security, as we know. You can be fully compliant and still be breached.
Learn more about Leigh-Anne and Tim’s Briefing (as well as lots of other cutting-edge content) in the Briefings schedule for Black Hat Europe, which returns to The Excel in London December 2-5, 2019.
For more information on what’s happening at the event and how to register, check out the Black Hat website.
Read more about:Black Hat News
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums
5 Reasons To Move your PKI Deployment to the Cloud