Researchers Expose New Credit Card Fraud Risk 219
An anonymous reader writes "Researchers from the University of Cambridge have discovered flaws in the card payment systems used by millions of customers worldwide. Ross Anderson, Saar Drimer, and Steven Murdoch demonstrated how a simple paper clip can be used to capture account numbers and PINs from so-called 'tamper-proof' equipment. In their paper (PDF), they warn how with a little technical skill and off-the-shelf electronics, fraudsters could empty customers' accounts. British television featured a demonstration of the attack on BBC Newsnight."
Get rid of the damn things! (Score:4, Interesting)
The powers that be LOVE us using credit cards. They can track us, and they can dupe the feeble-minded among us into spending our way into a lifetime of indentured servitude.
The failure of our government to (re-)introduce a $1000 bill, in spite of massive inflation, is a deliberate scheme to make it impractical for us to use untraceable funds for any substantial purchase. And it has nothing to do with tracking terrorists or drug money, it's just to keep tabs on and control over the law abiding populous.
Re:Get rid of the damn things! (Score:4, Interesting)
Re:Get rid of the damn things! (Score:4, Insightful)
Most will for large-ticket items (Score:4, Insightful)
It boils down to risk:
Most people passing funny money will want to get change rather than goods they can only resell at diminished value.
Also, many merchants use basic anti-counterfeit measures when accepting $20s and higher. Granted these measures have a high miss rate but they do catch amateurs.
Re:Most will for large-ticket items (Score:5, Funny)
The cheek of it- my $50 bills are as good as anyone else's! As was the $3 bill...
Re: (Score:2)
Re:Get rid of the damn things! (Score:5, Interesting)
Re: (Score:2)
Devil's advocate...
True, but can't pretty much everybody get a debit card tied back to a checking account?
Re:Get rid of the damn things! (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2)
Re:Get rid of the damn things! (Score:5, Informative)
See http://en.wikipedia.org/wiki/Legal_tender [wikipedia.org].
Re: (Score:2, Insightful)
Re: (Score:2)
Devil's advocate...
[...]can't pretty much everybody get a debit card tied back to a checking account?
If I'm right, those behave almost like credit cards - however, I'm not comfortable using one. In the event that there's fraud, the money is not in your account while it's being resolved. This isn't an issue with credit cards, since it's merely your credit being "on hold" rather than having money taken away from you. If you don't have a credit card, you generally don't have as much money to use (making fraud very damaging.)
I've worked in a customer service call center where people were calling up about u
Re: (Score:2)
Re:Get rid of the damn things! (Score:5, Insightful)
Re: (Score:3, Insightful)
These boxes can be made to make this attack nearly impossible.
But it would cost another 5 bucks to manufacture it.
Hell, if the designed them so the case was steel, and as thin as an iPhone this problem goes away because:
a) it would take serious effort even AFTER you knew what to do. Raises the risk.
b) You couldn't attach something to it without it being noticed.
As far as the software goes, encrypt the data.
Re: (Score:2)
In Australia, merchant banks will only accept transactions encrypted to 3DES. This was a fairly recent change. Retailers (including the very large one I helped through the PIN pad changeover) spent rather a lot of money on the changeover, and had no complaints about the investment. Nobody watches the till quite like a grocer...
Re:Get rid of the damn things! (Score:5, Informative)
It's like entering your credit card information on a website for a purchase. The connection to the server may be encrypted, but the data sent from your keyboard to your pc is not, and this is the same as where the hack with the card readers/pads is occurring.
Re:Get rid of the damn things! (Score:4, Interesting)
Wow you guys really do have it bad.
Re: (Score:2, Informative)
These damn pinpads have more tamper-detect on them than a chastity belt. You sneeze and it dumps it's keys.
Re:Get rid of the damn things! (Score:4, Insightful)
Re: (Score:3, Insightful)
he failure of our government to (re-)introduce a $1000 bill, in spite of massive inflation, is a deliberate scheme to make it impractical for us to use untraceable funds for any substantial purchase. And it has nothing to do with tracking terrorists or drug money, it's just to keep tabs on and control over the law abiding populous.
It might also have something to do with the fact that most people aren't crazy enough to walk around with thousands of dollars on them. In the end, it wouldn't matter, because
align responsiblity and CAPACITY for change... (Score:2)
If you made the banks, who have the capacity for change, liable, you'd see change.
Re: (Score:2)
Re: (Score:2)
Is anyone here really surprised? (Score:5, Insightful)
First rule of security in my book: Someone who wants something bad enough, they will be able to circumvent nearly anything in order to get it. So its a matter of how badly they want it. Since its money in question, I'd say that a variety of organizations and people want it pretty bad.
Re:Is anyone here really surprised? (Score:5, Informative)
This reminds me of a quote (the source eludes me at the moment):
"If it can be engineered by one human, it can be reverse-engineered by another human."
Re:Is anyone here really surprised? (Score:4, Interesting)
I think it is only a matter of time before this gets transferred to shop terminals - if you need to bring something and remember something, then it makes life a lot harder for hackers.
Re: (Score:2)
Another idea is to have the customer physically possess the unit that does the PIN entry as well as the smartcard. Perhaps instead of cards directly, have this be a module that is included in cellphones, and the customer's smartcard be a SIM ca
Re: (Score:2, Insightful)
Re: (Score:2)
I've encountered countless amounts of commercial software, hardware products and services where the company states that they are very secure, but when investigating things myself, I find that its trivial to circumvent their security. Consumers deserve better than this and its all of our responsibilities to make all people aware of these problems.
Actually, one of my customer sites isn't using passwords specifically because they demanded that logging in be easy. Yeah, I had to write that code while simultaneously assuring my boss that it's "as secure as can be". I pretty much hated my life after having to design a legitimate login system and then having to hack in a back door so that these doofs could use barcodes to log in. Barcodes that anyone can photocopy.
Damn you Clippy! (Score:5, Funny)
You bastards shouldn't have insisted he be fired! (Score:2)
In related news, the alternate Clippy, the advice dog, lost his job as a neuticles model and was sold to a company that tests military grade blood-clotting bandages. He's shot in the abdomen three days a week so trainees can learn how to apply the dressings. And all because you didn't want a friendly little animated help-mate watching after you.
You bastards.
I can build an atomic weapon with a paper clip (Score:5, Insightful)
OK, a paper clip. PLUS A BUNCH OF OTHER STUFF.
Well, shoot, I could probably build an atomic weapon with a paper clip. PLUS A BUNCH OF OTHER STUFF.
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
Actually I stand corrected - it won't work. But it would make a mess!
Re: (Score:2)
All they need to do is encrypt the account and PIN numbers on the card and then have them compared with the encrypted numbers on the bank's system and problem solved.
The way they've managed to break it is essentially to "tap" into the card readers and intercept the account and PIN numbers from the card. Then the fraudsters make fake cards with the information. It seems like ridiculously lousy authentication because a
Re: (Score:3, Interesting)
For those of you who haven't actually read the article (it is not unheard of!):
They use it to peel through a hole in the back of a owner-accessible compartment for some rarely used extra modules to insert it into an open via in the pcb which just happens to carry a serial data line transmitting PIN and card details...
You could even nicely mount your eavesdropper circuit in that compartment.
This is quite startling IMO, as the de
Re: (Score:2, Funny)
I never should have said yes...
They're looking in the wrong place (Score:5, Insightful)
People will gladly give their credit card number over the phone to a shady pizza shop, just to get a 15 dollar pizza delivered to their door.
We could build the most secure credit card system in the world, but the problem is that it has to be simple enough for idiots to use.
Re:They're looking in the wrong place (Score:5, Informative)
Re:They're looking in the wrong place (Score:5, Funny)
Re: (Score:2)
Paper clip? (Score:5, Funny)
Hmm, Macgyver must have tipped them off.
Re: (Score:2)
Yeah, but MacGyver would have been able to do it with a paper clip made of paper.
Tapping (Score:2)
Re:Tapping -- knowing what to look for. (Score:2)
Oh, and one other thing to look for. Look for the authors of this paper in a maximum security prison, after complaints by the banking industry. We've seen this before with ATMs in france.
This is a UK/Europe card system issue... (Score:5, Informative)
Why isn't it a PIN = SecurID + PIN (Score:4, Insightful)
(offtopic)
My biggest pet peeve is why are account numbers (on checks) in the clear while the same is basically true of PIN numbers (without any added "salt")
For checks I would like to see the account number + check number translated a 16 to 20 digit hash of which only the bank knows how to decipher to the correct account and check number?
(/offtopic)
Re: (Score:2)
security through obscurity doesn't work. someones, somewhere will figure it out. Then you will think you are secure, less people will be looking out for potential fraud thus giving more room to the fraudsters.
I have said it many times. Barring a radically new development, something that is a complete paradigm shift(literally not market speak) digital money will fail. You can NOT secure it for any real length of time.
My 'guts' tells me it can be done. I would love to put togeth
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
As for the numbers printed on checks, apenzott has an excellent idea. It wouldn't be hard for banks to use a 128 or 256 bit encryption key stored in a secure location [1] and have each person's check printed with the encrypted bank account number, perhaps using the check number as the IV (so each check has a different value), although using the check number is a small
Re:[Encrypted account and check numbers] (Score:2, Insightful)
Given that a one way hash can't really be reversed, that idea doesn't make much sense in the way that you posted it. A one way hash at first makes sense, except in reality it doesn't, as currently deployed. The numbers on your check have a routing number and account number. Both are numeric values with relatively few permutations when contrasted against case sensitive alphanumeric hashing. The routing numbers of banks are also no secret. Put simply, it'd be a trivial matter to brute force the hash with the simple numeric values we use today.
OK, I'm using the wrong terminology.
Routing number keeps the same public self (we need to send the check to the correct bank for processing.)
Account number xxxxxxxx Check number yyyyy becomes zzzzzzzzzzzzzzzz.
Issuing bank has key to turn zzzzzzzzzzzzzzzz back into original component numbers and verify that z... was not some made-up number in attempt to create a "bad check" of which there is no real account number attached to. Also xxxxxxxx, once extracted is verified to the name printed on the check. Aft
Re: (Score:2, Informative)
Tough Interview (Score:5, Insightful)
Re: (Score:2)
Re:Tough Interview (Score:5, Funny)
Re:Tough Interview (Score:4, Informative)
It is one of the finest pieces of political TV ever.
Re: (Score:3, Interesting)
Re: (Score:2, Insightful)
Re: (Score:3, Informative)
Re:Tough Interview (Score:5, Interesting)
Short, correct and difficult to answer questions. Ask the right questions, that's all it takes.
Bravo BBC
Re: (Score:2, Interesting)
Far too often I hear interviews were the subject gives some double-talk half twisted lie which makes no sense, and the interviewer si
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
In the US, this would be an incredible level of journalism.
Re: (Score:2)
Re: (Score:2)
Surely, if you're not actually asking the pertinent questions is it really journalism?
Re: (Score:3, Informative)
Jail Time? (Score:3, Insightful)
MacGyver (Score:2, Funny)
What not to do (Score:2)
And here's a link of exactly what you should NEVER do because it is illegal!
(posts to internet site frequented by absolutely everyone)
Clippy? Is that you? (Score:3, Funny)
Carry Cash! (Score:2)
It doesn't really matter what technology you use for monetary transactions, there are bad people who will work harder to steal it than to earn their own money. Just minimalise your risk and stop worrying about it.
Mainstream media is the worst terrorist.
Re: (Score:2)
MUGGINGS UP 300%!!
Re: (Score:2)
"Hey, gimme your wallet or I'll cut you!"
BAM!
Re: (Score:2)
Re: (Score:2)
No one has you arrested because they want to make you the criminal.
It is very hard to hold someone up from overseas
To rob you people have to be exposed to the surroundings.
I want how much money was physically taken from people in that same time period?
Re: (Score:2)
Another hole in the sieve? (Score:3, Insightful)
This is just one more flaw.
Re:Another hole in the sieve? (Score:4, Informative)
Re: (Score:2)
They could refuse to offer credit under those conditions though, it's obviously still making them money at this point.
Where's the crypto? (Score:5, Interesting)
Where's my private/public cryptography? I want to carry around my own damned device with keypad and display. The display would show me *exactly* what my financial institution will think I'm authorizing, and the keypad would be used to enter the passphrase to decrypt my private key, which is never ever ever transferred outside of the devices local filesystem. It's generated by the device and the public portion uploaded in a secure manner to my financial institution. The secure manner is a complicated issue, but there are degrees of inconvenience that can be induced to do it right, and allow me to opt to allow nothing more convenient than that.
I go to a damn store or online retailer.. When ready to purchase, it somehow gets the data to my device (maybe encrypt with my public key, maybe direct connect to my device, maybe through the financial institution, whatever, the security risk in this transaction being the nature of what I'm buying, not in any way risking the actual money being transfered). I enter my passphrase (which could be as simplistic as a 4-digit pin, but at my discretion, not theirs) to signify accepting the terms my display gives me (i.e. authorized wal-mart to take 5 dollars from my account this one time, or authorize phone company to withdraw no more than 25 dollars on a monthly basis, the transaction may have tolerances and periodic, but always show me the tolerances and period and *who* I'm really authorizing to get the mony). With my private key decrypted, use it to sign the payload, then my financial institution *must* receive that cryptographically signed authorization to transfer payment. The retailer *never* has anything more than data to confirm that one transaction (or reuse for repeat data if I declare that trust, within definable thresholds). To commit 'identity theft' (horrible phrase), they would either need to compromise the financial institutions database with *write* access to replace my public key with their own (by the way, invalidating my real key so I should notice it) or steal my device physically, which I should know. The device should overwrite memory contents where the key was with random bytes every time it completes an authorization, and therefore physical theft or tampering should lead to a dead end without my passphrase.
Re: (Score:2)
That's not even getting into your other major flaw, and your incorrect assumption.
Re: (Score:2)
With a secure authentication system, the only way someone could impersonate me is if I make a mistake. Much better. The old fashioned "username and password are the same" needs to go.
Re:Where's the crypto? (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2, Informative)
So, what do you loos
But still... (Score:2)
And so the chip cards have processing elements on card that have data input and output, and never make available their contents to any device they interact with? Or is there assumption that the ATM/POS equipment is all trustworthy and secure and will discard the data and never be possibly compromised by a malicious retailer?
I can always dream... (Score:2)
Except... (Score:2)
That's why I say my device must have a private keypad/display, so I don't have to trust the POS equipment at all. Besides, doesn't cover credit card numbers, which remains the significant share of online purchases.
Doesn't apply to US card systems (Score:2, Insightful)
Worth pointing out (Score:2)
On the otherhand, you can attach a skimmer to a reader to copy the magnetic strip and set up a camera to capture the pin in 5 minutes and remove it in 20 seconds. Far easier method
Keypad on the card (Score:5, Interesting)
OK: this would make the cards somewhat bulky and since people tend to have several cards their pockets would bulge. So why not allow people to buy their own small keypads (which they trust to not have been tampered with) that they can plug their cards into and plug the whole lot into the retailer's machine.
Just a paper clip, huh? (Score:2)
Banks and Security (Score:3, Informative)
banks should be liable (Score:5, Insightful)