Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/3/2012
04:06 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

PIN Pads Put Millions At Risk, Researchers Say

Payment terminals handled more than 852 million card payments in the U.K. alone in April 2012

Payment terminals, known as PIN Pads, are putting hundreds of millions of consumers worldwide at risk everyday a British IT security company is warning.

Click here for more of Dark Reading's Black Hat articles.

The terminals, which are used by retailers, handled more than 852 million card payments in the UK alone in April 2012 according to the UK Cards Association.

Researchers at MWR InfoSecurity have found that the terminals are not secure and codes can be introduced by malicious smartcards that will then allow criminals to have access not only to a customer’s PIN and PAN (Primary Account Number shown on the front of a plastic card) numbers but also gain access to the merchant’s network.

“Our research shows security of PIN Pads is below that which consumers should expect for transactions of this nature. The security employed in the software is not up to the job for such sensitive transactions, leaving the devices open to many forms of attack”, said Ian Shaw, Managing Director of MWR InfoSecurity.

“As a result of this, a sophisticated attacker may be able to compromise these terminals to the extent that it would be very difficult to identify if they had been breached.”

“Our investigations have shown that the range of vulnerabilities found in these devices, now part of the everyday shopping experience, could compromise consumers’ card details and PIN numbers. It may also leave merchants unprotected and cause serious disruption to their businesses, potentially exposing both of them to serious fraud”, he added.

For example, a customer at a restaurant could pretend to be making a payment with a “Trojan card” but instead has gained access to the payment terminal. From that point onwards, all pin numbers and other card holder information that passes through that terminal can be gathered by the criminal. They can then take advantage of a number of existing communication channels, such as Internet connection –Wireless, Bluetooth, mobile networks– or phone lines to retrieve that information. Alternatively, the criminal could return and insert again the malicious smartcard to collect the recorded data from the payment device.

“Generally, efforts are being directed to securing the PIN Pads physically but the software installed in the terminals remains highly vulnerable. Even the typical consumer smartphone deploys more security features than the technology used in these devices”, said Ian Shaw.

MWR InfoSecurity has been carrying out research on payment terminals that exchange information with this type of card and has found an alarming range of weaknesses shared by vendors of these devices in UK.

The firm has contacted the vendors and has shared their discoveries with them but at the moment is not able to provide any further details in an effort to prevent criminals from taking advantage of the situation.

“We need to work together with the vendors so that the problem is dealt with quickly”, concluded Shaw.

However, MWR believes this is very serious issue and will be highlighting a number of vulnerabilities it has identified and demonstrating its findings at the Black Hat security conference in Las Vegas on July 25th.

MWR InfoSecurity supplies services which support clients in identifying, managing and mitigating their Information Security risks.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-0173
PUBLISHED: 2019-08-19
Authentication bypass in the web console for Intel(R) Raid Web Console 2 all versions may allow an unauthenticated attacker to potentially enable disclosure of information via network access.
CVE-2019-11140
PUBLISHED: 2019-08-19
Insufficient session validation in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
CVE-2019-11143
PUBLISHED: 2019-08-19
Improper permissions in the software installer for Intel(R) Authenticate before 3.8 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-11145
PUBLISHED: 2019-08-19
Improper file verification in Intel? Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-11146
PUBLISHED: 2019-08-19
Improper file verification in Intel? Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access.