Chip-and-Pin Vulnerable To Subtle Trickery 64
An anonymous reader writes "Cambridge University researchers, in an investigation for BBC Television's Watchdog programme, have demonstrated a man-in-the-middle attack for the chip-and-pin credit card security system used throughout the UK and Europe. In the attack, the card is inserted into a card-reader that has been tampered with, and the information transmitted in real-time to an accomplice who uses a specially modified card to make a higher-value purchase elsewhere. The modified card-reader shows only the expected amount, but the larger amount is deducted from the victim's bank account. It would not be easy to use this method in practice because the two transactions must be made simultaneously. The same team recently demonstrated a hacked chip-and-pin terminal playing Tetris."
The Tetris hack was a fake (Score:2)
Sure, this shows that you can fool a user tothink they're using a valid machine, but it does not get at the transaction.
Re:The Tetris hack was a fake (Score:4, Informative)
The victim's card goes in the "fake pin machine" which is linked via laptops to a "fake card" in a "real pin machine" at another shop (in this case, a jewelers).
The laptop link makes it look like the victim's card is physically at the jewelers store, and takes care of all the validation. The victim is told the dinner price, and enters their PIN into the "fake PIN machine", which says "thank you" and prints a fake receipt. Meanwhile, the PIN number is then passed to the criminal at the jeweler to key into the real PIN machine and buy the diamonds.
Tricky to pull off due to the timing - but a real treat all the same.
Re: (Score:3, Interesting)
The there is no connection between the bank and the card-reader that has been tampered with. As far as the bank is able to see, there has been a legitimate transaction for £2000. As far as the victim sees, the transaction is for only £20 (until he receives his statement one month later).
The point is: the actual transaction is £2000. The trickery is making the victim believe he is authorising a transaction of only £20 by present
Re: (Score:3, Insightful)
Do it at a petrol station or somewhere where the price varies a lot, add £1 onto the transaction (screening out the 'obvious' figures to avoid people who put exactly £20 of petrol in for example noticing the error), and have the 'real' transaction come from the 'real' retailer and you'd get away with it for quite a while.
Petrol station employees are paid minimum wage and not security checked & have an incentive to ge
Re: (Score:2)
Yes, BUT (Score:1)
Re: (Score:1, Informative)
Not sure whether you're being sarcastic, but if not then safer for whom and in what way? Previously I had to sign for everything I bought on my card, and if it came to it then at least an expert should be able to spot a forgery in the event of a dispute. Now the only authorisation is typing in a 4 digit code in a crowded shop. Worse, a series of crowded shops time after time. If anyone managers to see my code then it just takes a pickpocket (or acquaintance
Re: (Score:3, Insightful)
That won't do you any good because clerks can't distinguish from a legitimate signature and a forged one. Therefore if the owner of a card wants to cheat the bank, they can just sign their own signature with their left hand or something and then deny the charge. If the bank doesn't believe you when you say it was fraudulent then you'll be stuck with the charge (or the store will because they didn'
This issue is not whether it is more secure... (Score:2)
It is more secure than a signature that is never checked, sure, but 100% secure? No way.
This effort is designed to prove that it can theoretically be defeated without posession of the physical card, but you can easily imagine the decidely low-tech method of someone looking over your shoulder as you make a transaction and then pick-pocketing your card
attack easly detected (Score:4, Interesting)
The attack is proof of concept, but it leaves too much of a trail.
Re: (Score:2)
It collects the information and simultaneiously
(A) Creates the online order with info from the card (or simply stores it for later use)
and
(B) Runs the designated order through another machine.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Canceling out legitimate purchases with phony receipts showing simultaneous transactions.
'Watchdog' tonight (Score:5, Insightful)
As I understand it, the point of this research is that the banks have been claiming that chip-and-pin terminals are completely tamper-proof. In fact, they may be tamper-proof from the banks' point of view (preventing fraudulent transactions by destroying encryption keys if the case is tampered with), they're not from the customers' point of view - a dodgy establishment or criminal employee could clone your card with a terminal that looks legit.
So, ripping out the innards and putting a machine playing Tetris inside looks silly, but demonstrates that the devices aren't inherently trustworthy. And this is the next step: showing that a card can be cloned and the details used to make a fraudulent transaction using modified hardware.
Re: (Score:2, Insightful)
What this does is point out that the first sentence is not correct and that the second does not automatically follow. I am not particularly protective of or abusive towards Chip-And-Pin but the "Nothing to do with me mate. You'll have to prove it." attitude of the banks is kind of annoying. I'm much more happy paying my taxes to find this kind of
Re: (Score:2)
Where did you get that from (for smart cards)? if this was the case they wouldn't have to do this complicated man-in-the-middle simultaneous transaction attack.
Re: (Score:2)
You really don't have to get hold of one of the legit boxes, just make something that looks passable and has an LCD display and card reader. That gets you the pin,
Re: (Score:2)
You're right. As you say, it's not cloning, and what sjmurdoch and co demonstrated is a man-in-the-middle attack.
Your victim puts their card into a modified chip-and-pin terminal. At the same time, a criminal carrying a card connected to a hidden laptop goes to make a purchase in another store, putting the (fake) card in a (legitimate) terminal
Is it a big deal? (Score:2)
Second, do consumers not have credit card loss protection in
That is the whole point of Chip+PIN (Score:2)
Yes, we do. The whole point of Chip+PIN is to transfer the liability for fraud to the cardholder, as any transaction made using the PIN "must" have been made by that cardholder. So no fraud protection, no reversing the charge.
Re: (Score:1, Insightful)
There's a demonstration of one thing (man-in-the-middle attack on Chip and PIN user) which is either very rare or non-existent in the wild (it's hard to be certain partly because banks are so secretive). That's Slashdot-worthy, but it shouldn't be a surprise to anyone who has used Chip and PIN and thought about it, and the real solution (every user owns their own tamper-resistant terminal) is too costly to consider in the near future.
To make this demo seem "relevant" t
Hard to pull off with any card (Score:1)
I personally wish that we did use the chip and pin cards in the US because it's better than signature. I usually sign for things with "PWNED" or I draw pictures of pacman or kung-fu stick figures and no one seems to notice. The security that comes with signatures is a joke.
Re: (Score:2)
If someone steals your card and uses it, you simply repudiate the transactions. You can easily prove that they are not genuine, because the thief will not have been able to forge your signature.
If someone steals my chip-and-pin card and manages to use it, the bank will charge me for the transactions, and will simple laugh at me if I complain. Without a signature on the sales slip, I have got no proof
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
I'd say both have specific advantages and disadvantages, ultimately if the bank and customer wanted better security then both should be used side-by-side.
Check ID (Score:2)
A clerk, had me sign the receipt, picked up the card - looked at the card & my signature, and then handed me back my card with a 'thank you'.
Re: (Score:1)
Re: (Score:2)
Single bit check is not enough (Score:2)
check is really 1-bit, the fake card can respond by itself, without
relaying any data. Is it on purpose ?
Much safer way is to measure time while performing a handshake.
Yes, there ARE some technical problems, but it would be a real check.
Re: (Score:2)
A challenge response is otherwise known as a handshake. They took a small challenge because otherwise the handshake would take too much time, making the method meaningless. A few nanoseconds is a bit on the possitive
Re: (Score:2)
FC = Fake Card, FT = Fake Terminal, C = Card, T=Terminal
1. Simplest
C: Hello, I'm card
T: Really ? Then we'll check how fast can you respond. Ping!
C: Pong!
T: 6ns, good time. Now let's shake hands...
Fake is obvious
2. More complicated
C: Hello, I'm card
T: Let's see. When I say, tell me your number, ready ? Ping!
C: 12345!
T: 20ns, looks like you're real !
Fake is also simple, the FT should first get the number from the card, then transmit it to FC.
Anyway, all needed information is
Re: (Score:3, Informative)
Ultimate Financial Security (Score:2, Funny)
For the truly security minded: a wallet, a handgun, and the bottom side of your mattress. No interest charges or minimum payments!
Re:Ultimate Financial Security (Score:5, Funny)
"I'm sorry, sir, but I can't hear what you're saying through the mattress you're wearing."
Or did I misinterpret what you're suggesting?
Subtle? (Score:2)
Coincidental Similarity? (Score:1, Funny)
The Register & Original blog (Score:1)
http://www.theregister.co.uk/2007/02/06/card_secu
Original blog:
http://www.lightbluetouchpaper.org/2007/02/06/chi
nothing new here (Score:2, Interesting)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
A bit of dumpster diving around one of them and you'd have a handful of legit card numbers to clone. All you're missing is the CVE.
Now find online retailers that don't ask for the CVE (admittedly getting fewer... My ISP doesn't for example).
Or just pay for car parks, which aren't chip/pin enabled and just take the magstripe and debit your
What I learned at OfficeMax (Score:2)
For everyone else, I've reverted to checks and cash.
Classic Quote... (Score:3, Funny)
Watchdog?
I am watching a dog.
I don't get it (Score:3, Interesting)
I think Bruce Schneier's paper [schneier.com] said it best. Sure the card is trustworthy, but when you're using any kind of smartcard, the card isn't the trust boundary. The card plus the computer (or pinpad in this case) that you're using it on is your trusted device conglomerate.
I think the real demonstration of this attack is that pinpads have vulnerabilities. Even that isn't earth-shattering. So does everything else where physical access is granted.
Which isn't to say that it isn't newsworthy (people should definitely be careful where they stick their card), but it does feed into idea #4 on the six dumbest ideas in computer security [ranum.com].
Relay attacks and terminal security (Score:2)
Basically it comes down to the fact
Easier hack? (Score:1)
1a) Create a fake terminal that looks and operates like a genuine terminal. All the terminal does is record the 4 digit PIN.
or
1b) Place a camera such that it films the terminal as the card owner types in their 4 digit PIN.
2) Steal the card
3) Use the card + pin
In short, the terminal verifies itself to the credit card compan
Way too complex (Score:2)
Then crooks simply have to collect a bunch of valid c
Re: (Score:2)
So if you only make a copy of the magnetic stripe on a card without a chip or with an inactive chip, there is a very high chance that the terminal will decline the transaction. As
Cut out the middle man (Score:1)
Re: (Score:2)
Just have to work on the shops (mainly larger ones) that insist on taking the card off you and using their own proprietary chip/pin system. They'd probably do the same "oh, we don't use those things.. here type your pin into this keypad".
Don't shop as Tesco - you PIN is not safe (Score:1)
The first time that I came across (all night petrol store) this I refused on the grounds that my bank had told me to not use terminals that had been
wow... (Score:1)
Has already been done in Denmark (Score:2)