Difficult to Exploit EMV Hack is Quickly Patched

How to Disrupt the Cycle of Merchant Fraud Loss

How to Disrupt the Cycle of Merchant Fraud Loss

Researchers discovered an EMV man-in-the-middle vulnerability and notified Mastercard.  Mastercard patch quickly eliminated the vulnerability. Don’t you wish it always worked this way:

“The methods used by the researchers are based on the “man-in-the-middle” principle, where attackers exploit the data exchanged between two communication partners (in this case the card and the card terminal). To replicate this effect, the researchers used an Android app they had created and two NFC-enabled mobile phones. The app falsely signaled to the card terminal that no PIN was required to authorize the payment and that the card owner’s identity had been verified. Initially, the method worked only on VISA cards, as other providers use a different protocol (a protocol governs data transmission).

Security measures outsmarted in two ways

At first glance, the second idea behind bypassing the PIN code verification step appears simple: “Our method tricks the terminal into thinking that a Mastercard card is a VISA card,” explains Jorge Toro, who works at the Information Security Group and is one of the authors of the research paper. Toro goes on to add that the reality was much more complex than it sounds, with two sessions having to run concurrently for it to work: the card terminal performs a VISA transaction, while the card itself performs a Mastercard transaction. The researchers used these methods on two Mastercard credit cards and two Maestro debit cards issued by four different banks.

The researchers informed Mastercard immediately after they made their discovery. They were able to confirm experimentally that the defenses put in place by Mastercard are effective. “It was both enjoyable and exciting to work with the company on this,” explains Toro. Mastercard updated the relevant safeguards and asked the researchers to try to attack the payment process in the same way again, and this time it failed. The researchers will present their paper with a full overview of the method at the USENIX Security ’21 symposium in August.”

Overview by Tim Sloane, VP, Payments Innovation at Mercator Advisory Group

Exit mobile version