November 2014

Visa Contactless Smart Cards and the $999,999.99 Fraud

Visa_Contactless_Smart_cards_and_the_$999,999.99_Fraud

Contactless payment cards have long been a topic of conversation, if somebody brushed against you on the underground could they take your money? But before answering that we need to look at the latest discovery by security researchers at Newcastle University who have discovered that the Visa smart card software which has a £20 payment limit is not applied in any foreign currency. So if the terminal asks the card for $999,999.99 it will happily create the necessary cryptographically protected payment message and the terminal will think it has an authorised payment for the same amount. I’m a little surprised that none of the risk management controls are breached for such a high value but have no reason to doubt the Newcastle findings which they presented at the ACM Computer and Communications Security Conference in Scottsdale, Arizona this week.

Without needing to look much further it is obvious this is an implementation error and not a fundamental vulnerability in the contactless card concept. As a founder member of the ‘Fit for Purpose’ security society nothing in the Newcastle findings would make me want to move away from the contactless payments card concept. The point the team does raise however is why does the smart card not authenticate the terminal? Clearly if you take the card to a contactless terminal in your local supermarket it is highly likely to be authentic and accordingly would itself impose the £20 bar. However if you went to pay some unknown merchant in a street market with a mobile phone terminal the authenticity of the terminal is of greater concern. The rogue merchant does of course have to get the payment into an acquirer in the 4-Party payment model (Issuer, Cardholder, Merchant and Acquirer) and I would be somewhat surprised if they could get a $1m payment into the system without detection and unless your bank account is much better than mine the Issuer is unlikely to pay up.

So back to the two issues, the underground contactless cuddle, as it is affectionately known and the failure of the card to authenticate the terminal in the payment protocol. Let’s look at the terminal authentication first, how do you authenticate some entity? Simple, you ask it to prove it knows a secret, if anybody can come up with a simpler fool proof approach that would be very useful. The payment organisations have spent the last 20 years getting rid of secrets in terminals because of the difficulty of distributing the secrets to the terminals and keeping them secret in the terminal. The little twist to the story is who are you communicating with? In practice of course it is the Issuer because he is the one that needs to authenticate your instructions and pass forward the legitimate payment. You are in effect communicating with the Issuer through the merchant’s terminal, I think it might be a general rule not to make payments to suspicious merchants or terminals.

So now we get to the cuddling problem and just to put it in perspective there are two scenarios, covert listening to a contactless payment which would be possible over hundreds of metres and powering up a contactless card to make an unauthorised payment. If the protocol is implemented correctly the covert listening while not desirable does not provide sufficient data to allow fraudulent use of your card. The capability to power up the card and extract a payment is however clearly unacceptable. There are however two requirements, the ability to get enough power into the contactless card to power up the chip and the ability to implement the payment protocol. It is of course the ability to get power to the chip that is the problem and given that the magnetic near field varies inversely as the cube of distance the attacker would need a big battery unless he really could cuddle up to you on the underground. It is however fairly easy to prevent, any form of shielding around the card and even cooking foil would do trick. Smart sleeves can be bought at your local shop.

Dr David Everett, SCN Technical Researcher.





Whitepapers

27/03/2015 Headlines

Cryptomathic calls for EU Standards on E-ID and Trust Services to Recognise that Cloud-Based Digital Signature Schemes do not Require a Secure Element

As the European Commission Directorate General prepares to mandate electronic identification and trust services (eIDAS) - to boost confidence in digital service.....Read More

ACI Worldwide Powers Online Banking for Polish and Slavic Federal Credit Union

ACI Worldwide has announced that Polish & Slavic Federal Credit Union (PSFCU) has selected its integrated online banking platform for credit unions 'WebFederal'.....Read More

ICO Orders Lead Generation Firm to Stop Sending Nuisance Texts

The ICO has ordered Sweet Media Ltd, a lead generation company to stop sending nuisance texts. The enforcement notice was issued after the ICO raided a SIM farm.....Read More

Fiserv Completes First Tokenized Transactions via Accel Debit Payments Network

Fiserv, Inc. it has completed its first tokenized transactions via its Accel debit payments network. Tokenization replaces the traditional payment card account .....Read More

BIO-key Launches Compact USB Fingerprint Reader EcoID

BIO-key International, Inc. has introduced the EcoID, a compact USB touch fingerprint reader, at the connect:ID convention this week. The sleek, low profile for.....Read More

Proposed Acquisition to Create Leading Global Player in Online Payment and Digital Wallet Services

Optimal Payments Plc has entered into an agreement to acquire Skrill Group from CVC Funds and other shareholders, for an enterprise value of approximately Euro .....Read More


Video Interviews

Tim Jones talks on the wealth of networks

Christophe Dolique of Gemplus talks about ·SIM

Dominique Brule of Philips Semiconductors talks about Near Field Communication