Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity

    EMV Is No Silver Bullet for Payment Card Security

    Written by

    Sean Michael Kerner
    Published August 10, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—In the wake of the Target data breach and other retail breaches like it, there has been a renewed call in the United States for a move to Chip and PIN credit cards, also known as EMV. At the Black Hat USA 2014 conference here, however, multiple researchers revealed that EMV isn’t necessarily a panacea for all that ails the payment card industry.

      In fact, Black Hat 2014 isn’t even the first time researchers have revealed flaws in EMV. At the Black Hat 2012 event, a security researcher known only as Nils demonstrated flaws in payment card terminals. This year, Nils was back, once again demonstrating a similar set of flaws to the ones he first publicly disclosed two years ago.

      Nils along with John Butler, now both at security firm MWR Labs, demonstrated before a large Black Hat audience how they could take over mobile payment terminals by using a malicious EMV card. Mobile payment terminals are small devices that can enable a merchant to take payments anywhere. The two researchers declined to name any of the vendor devices, as not all of the flaws are yet patched.

      Butler explained that they were able to get root access to the mobile payment terminal and leverage the Bluetooth stack. Going a step further, the two researchers demonstrated how just like it was possible to attack a payment terminal with a malicious card in 2012, the same is true in 2014.

      In a demonstration, Nils inserted a maliciously programmed EMV card into a mobile payment terminal to show what could be done. Instead of stealing anything, the two researchers instead loaded a game they built called chippypin, just to demonstrate they could do whatever they wanted to the device.

      Butler noted that an attacker could potentially steal credit card information and turn the payment terminal into a card skimming device. Another possible attack is to change the programming, such that transactions are not properly validated by the credit card issuers. With such a programming change, all charges made on the terminal would default to being accepted, without any verification or actual communication with a financial institution.

      Nils said they reported the various vulnerabilities on the mobile payment terminals to vendors in 2013, and many, though not all, have had fixes in place since April of 2014.

      Ross Anderson, a researcher with Cambridge University in the U.K., also had some strong words about why EMV is not as secure as some might think.

      “PIN entry devices are supposed to be tamper-proof,” Anderson said.

      He added that in 2008, it was revealed that PIN entry devices for EMV cards in the United Kingdom could in fact be tampered with. Anderson said he bought a bunch of devices on eBay and gave them to his students, who were able to break into them.

      “We found out how to compromise the most popular PIN entry device in Britain using a couple of dollars of components, a few minutes of work and a paper clip,” Anderson said.

      Going a step further, Anderson said that research has revealed that it is possible to use a Chip and PIN card without knowing the PIN.

      “It turns out that if you put a device between the Chip and PIN card and the PIN entry device, you can trick the device into thinking it was a chip and signature transaction.” With a chip and signature transaction, an EMV card is used along with a signature, rather than a PIN.

      Additionally, Anderson said that perhaps as many as half of all EMV terminals in use today do not generate random numbers properly.

      “Without generating random numbers properly, a bad guy can manipulate transactions so they can capture transaction data for later use,” Anderson said.

      Overall, Anderson said that EMV is not a secure protocol; rather it is a toolkit that can enable security only if properly configured and deployed.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.