[LINK] RFC: The Dangers of Contactless Payment Schemes

Jan Whitaker jwhit at melbpc.org.au
Thu Sep 13 16:38:35 AEST 2012


At 11:45 AM 12/09/2012, Roger Clarke you wrote:
>Consumer and media interest in this topic is hotting up again.
>
>I've finally got around to flinging my comments into a resource document.
>
>As always, constructively negative feedback gratefully received:

How about fraudulent cards:


Chip and PIN cards can be cloned: researchers

Brian Krebs
Published: September 13, 2012 - 11:22AM

Researchers in the United Kingdom say they have 
mounting evidence that thieves have been quietly 
exploiting design flaws in a security system 
widely used in Europe and Australia to prevent 
credit and debit card fraud at cash machines and point-of-sale devices.

At issue is an anti-fraud system called EMV 
(short for Europay, MasterCard and Visa), also 
known as "chip-and-PIN". The cards include a 
secret algorithm embedded in the chip that 
encodes the card data, making it more difficult 
for fraudsters use stolen cards at EMV-compliant terminals.

Chip-and-PIN is widely supported in Australia, 
where major card brands work with banks and ATM 
and payment terminal makers to support the technology.

EMV standards call for cards to be authenticated 
to a payment terminal or ATM by computing several 
bits of information, including the charge or 
withdrawal amount, the date, and a so-called 
"unpredictable number". But researchers from the 
computer laboratory at Cambridge University say 
they discovered some payment terminals and ATMs 
rely on little more than simple counters, or 
incremental numbers that are quite predictable.

"The current problem is that instead of having 
the random number generated by the bank, it's 
generated by the merchant terminal," said Ross 
Anderson, professor of security engineering at 
Cambridge, and an author of a paper being 
released this week titled, Chip and Skim: Cloning 
EMV cards with the Pre-Play Attack.

Anderson said the failure to specify that 
merchant terminals should insist on truly random 
numbers, instead of merely non-repeating numbers 
­ is at the crux of the problem.

"This leads to two potential failures: If the 
merchant terminal doesn't a generate random 
number, you're stuffed," he said in an interview. 
"And the second is if there is some wicked 
interception device between the merchant terminal 
and the bank, such as malware on the merchant's 
server, then you're also stuffed."

The "pre-play" aspect of the attack mentioned in 
the title of their paper refers to the ability to 
predict the unpredictable number, which 
theoretically allows an attacker to record 
everything from the card transaction and to play 
it back and impersonate the card in additional 
transactions at a future date and location.

Anderson and a team of other researchers at 
Cambridge started their research more than nine 
months ago, when they first began hearing from 
European bank card users affected by fraud ­ even 
though they had not shared their PIN with anyone.

The victims' banks refused to reimburse the 
losses, arguing that the EMV technology made the 
claimed fraud impossible. But the researchers 
suspected that fraudsters had discovered a method 
of predicting the supposedly unpredictable number 
used by specific point-of-sale devices or ATMs models.

For example, the team heard from a physics 
professor in Stockholm who went to Brussels and 
bought a meal at a nice restaurant for 255 euros, 
and immediately after midnight that evening had 
his card debited with two transactions of 750 
euros each at another payment terminal nearby.

Anderson said the team had "lots and lots of 
victims" coming to them (several others are 
mentioned in the group's 
<http://www.lightbluetouchpaper.org/2012/09/10/chip-and-skim-cloning-emv-cards-with-the-pre-play-attack/>blog 
post on the paper), complaining of being ripped 
off and then denied help from their banks. The 
researchers say they notified the appropriate 
banking industry organisations of their findings 
in early 2012, but opted to publish their work 
because it they believe it helps to explain good 
portion of the unsolved phantom withdrawal cases 
reported to them for which they previously had no explanation.

"The point here is that when a bank turns down a 
customer because [a fraudulent transaction] looks 
like cloning and cloning isn't possible because 
the card has a tamper resistant chip, we show 
that this kind of logic doesn't stand up," Anderson said.

The research team said their work is informed by 
data collected from more than 1000 transactions 
at more than 20 ATMs and a number of 
point-of-sale terminals. They also purchased 
three EMV-enabled ATMs off of eBay, and began 
systematically harvesting unpredictable numbers 
from them in hopes of finding predictable random 
number generators. Their research on this front 
is ongoing, but so far the group says it has 
established non-uniformity of unpredictable 
numbers in half of the ATMs they looked at.

In response to inquiries 
<http://www.bbc.com/news/technology-19559124>from 
the BBC, a spokeswoman for the UK's Financial 
Fraud Action group downplayed the threat, telling 
the publication: "We've never claimed that chip 
and pin is 100 percent secure and the industry 
has successfully adopted a multi-layered approach 
to detecting any newly-identified types of fraud. 
What we know is that there is absolutely no 
evidence of this complicated fraud being 
undertaken in the real world. It requires 
considerable effort to set up and involves a 
series of co-ordinated activities, each of which 
carries a certain risk of detection and failure for the fraudster."

Anderson says the industry's response is typical.

"They're saying this is too complex a fraud for 
the average villain to conduct, but they always 
say that, and they said that about our PIN entry 
device compromise research 
<http://www.cl.cam.ac.uk/research/security/banking/ped/>in 
2008, despite the fact that it was already 
happening in the field. The second thing they're 
saying is they have no evidence of real cases. 
And that's exactly what they said in 2010, when 
we released our 
<http://www.cl.cam.ac.uk/research/security/banking/nopin/press-release.html>no-PIN 
fraud research. But we later learned that the UK 
cards association did at the time know that there 
were no-PIN frauds going on in France to the tune 
of about a million euros. Then when we went back 
and said, 'Aha, we've got them for making false 
statements,' it turned out that they'd written 
their statement very carefully to say they had no 
evidence of this happening in Britain, not no 
evidence of this happening full-stop. So this is 
following an established pattern by bank PR 
people of carefully denying it in ways that don't stand up."

A copy of the research paper is available 
<http://www.cl.cam.ac.uk/%7Erja14/Papers/unattack.pdf>here (PDF).

<http://www.krebsonsecurity.com>KrebsOnAecurity

This story was found at: 
http://www.theage.com.au/it-pro/security-it/chip-and-pin-cards-can-be-cloned-researchers-20120913-25ts1.html 





Melbourne, Victoria, Australia
jwhit at janwhitaker.com
blog: http://janwhitaker.com/jansblog/
business: http://www.janwhitaker.com

Our truest response to the irrationality of the 
world is to paint or sing or write, for only in such response do we find truth.
~Madeline L'Engle, writer

_ __________________ _



More information about the Link mailing list