banking security: attacks and defences - steven murdochsome proposed attacks still work: relay,...

48
Banking security: attacks and defences Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ work with Ross Anderson, Mike Bond, Omar Choudary, Saar Drimer and Sergei Skorobogatov Computer Laboratory www.torproject.org 11 September 2012, Leuven, BE

Upload: others

Post on 20-Sep-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Banking security: attacks and defences

Steven J. Murdoch

http://www.cl.cam.ac.uk/users/sjm217/

work with Ross Anderson, Mike Bond, Omar Choudary,Saar Drimer and Sergei Skorobogatov

Computer Laboratory www.torproject.org

11 September 2012, Leuven, BE

Page 2: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Chip & PIN has now been running inthe UK for about 7 years

• Chip & PIN, based on the EMV(EuroPay, MasterCard, Visa)standard, is deployed throughoutmost of Europe

• In process of roll-out elsewhere• Customer inserts contact-smartcard

at point of sale, and enters their PIN• UK was an early adopter: rollout in

2003–2005; mandatory in 2006• Chip & PIN changed many things,

although not quite what peopleexpected

Page 3: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Card payments in the UK are differentfrom the elsewhere

Before Chip & PIN After Chip & PINCards magstrip magstrip and chipCard verification magstrip chip if possibleATM PIN used PIN usedPoint-of-sale signature used PIN used

• No difference between credit and debit cards• No ID check at point-of-sale (signature rarely checked either)• Introducing Chip & PIN really made two changes:

• Chip used for authenticating card (ATM and PoS)• PIN used for authenticating customer (only new for PoS)

• The effects of the two changes are often conflated

Page 4: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

UK fraud figures 2004–2011Lo

sses

(£m

)

Year

2004 2005 2006 2007 2008 2009 2010 2011Total, ex phone (£m) 503 491.2 591.4 704.3 529.6 441 410.6

050

100

150

200

250

300

●●

● ●

● ●●

●●

●● ● ●

● ●

●● ●

● ● ●●

●●

●●

● ●

● ●●

● ●●

Card−not−present

CounterfeitLost and stolen

ID theft

Mail non−receipt

Online banking

Cheque fraud

Chip & PIN deployment period

Phone banking

Source: APACS/Financial Fraud Action UK

Page 5: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Counterfeit fraud mainly exploitedbackwards compatibility features

• Upgrading to Chip & PIN was too complex and expensive tocomplete in one step

• Instead, chip cards continued to have a magstrip• Used in terminals without functioning chip readers (e.g. abroad)• Act as a backup if the chip failed

• Chip also contained a full copy of the magstrip• Simplifies issuer upgrade• Chip transactions can be processed by systems designed to

process magstrip

• Criminals changed their tactics to exploit these features, and socounterfeit fraud did not fall as hoped

• Fraud against UK cardholders moved outside of the UK

Page 6: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Criminals could now get cash

Criminals collected:• card details by a “double-swipe”, or

tapping the terminal/phone line• PIN by setting up a camera, tapping

the terminal, or just watchingCloned magstrip card then used in anATM (typically abroad)

In some ways, Chip & PIN made thesituation worse

• PINs are used much more often (notjust ATM)

• PoS terminals are harder to securethan an ATM Tonight (ITV, 2007-05-04)

Page 7: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Protocol overview (as used in the UK)

Card→ PED• Card details (account number, cardholder name, expiry, etc.)• Public key certificate and static digital signature• Copy of the magnetic strip details

PED→ Card• Transaction description (value, currency, type, unpredictable

number)• PIN as entered by customer

Card→ PED• PIN verification result and authorisation code

Page 8: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

News this morning

6HSWHPEHU���������������SP

)ODZV�LQ�FKLS�DQG�SLQ

XQFRYHUHG

%\�0DLMD�3DOPHU��WHFKQRORJ\�FRUUHVSRQGHQW

&KLS�DQG�SLQ�FDUGV��EURXJKW�LQ�D�GHFDGH�DJR�WR�UHGXFH�FRXQWHUIHLW�WUDQVDFWLRQV��DUH�PRUH

YXOQHUDEOH�WR�IUDXG�WKDQ�ZDV�EHOLHYHG��DFFRUGLQJ�WR�QHZ�UHVHDUFK�E\�DFDGHPLFV�DW

&DPEULGJH�8QLYHUVLW\�

$�ODUJH�QXPEHU�RI�FKLS�DQG�SLQ�WHUPLQDOV�PD\�EH�LQVHFXUH��PHDQLQJ�FDUG�DQG�WUDQVDFWLRQ

GHWDLOV�FDQ�EH�FDSWXUHG�E\�IUDXGVWHUV�

7KH�ILQGLQJV��ZKLFK�ZLOO�EH�XQYHLOHG�DW�WKH�&+(6

FU\SWRJUDSK\�FRQIHUHQFH�LQ�/HXYHQ��%HOJLXP�RQ�7XHVGD\�

FRXOG�IRUFH�EDQNV�WR�LVVXH�PRUH�UHIXQGV�WR�FXVWRPHUV�UHSRUWLQJ�IUDXGXOHQW�WUDQVDFWLRQV�RQ

WKHLU�FDUGV�

%DQNV�RIWHQ�GHFOLQH�WR�JLYH�UHIXQGV�RQ�JURXQGV�WKDW�FKLS�DQG�SLQ�WHFKQRORJ\�FDQQRW�EH

FRPSURPLVHG��7KH�%ULWLVK�&ULPH�6XUYH\�IRU�����������IRXQG����SHU�FHQW�RI�IUDXG�YLFWLPV

GLG�QRW�JHW�DOO�WKHLU�PRQH\�EDFN�

5RVV�$QGHUVRQ��SURIHVVRU�RI�VHFXULW\�HQJLQHHULQJ�DW�&DPEULGJH�8QLYHUVLW\��VDLG��³$JDLQ�DQG

DJDLQ��FXVWRPHUV�KDYH�FRPSODLQHG�RI�IUDXG�DQG�EHHQ�WROG�E\�WKH�EDQNV�WKDW�>FKLS�DQG�SLQ@�LV

VHFXUH��WKDW�WKH\�PXVW�EH�O\LQJ�ZKHQ�WKH\�GLVSXWH�FDUG�WUDQVDFWLRQV��$JDLQ�DQG�DJDLQ�WKH

EDQNV�KDYH�WXUQHG�RXW�WR�EH�ZURQJ�

³7KLV�LV�D�JRYHUQDQFH�IDLOXUH�RQ�D�ELJ�VFDOH�´

0U�$QGHUVRQ�DGGHG��³:H�KDYH�FRPH�DFURVV�D�QXPEHU�RI�FDVHV�RI�SHRSOH�ZKR�KDYH�WUDYHOOHG

WR�FRXQWULHV�OLNH�6SDLQ��RU�HDVWHUQ�(XURSH��SDLG�E\�FDUG�DW�D�UHVWDXUDQW�DQG�WKH�IROORZLQJ

PRUQLQJ�KDG�WKRXVDQGV�RI�SRXQGV�RI�WUDQVDFWLRQV�WDNHQ�IURP�WKHLU�FDUG�DW�EDUV�RU�$70

PDFKLQHV�QHDUE\��7KHUH�DUH�HQRXJK�FDVHV�RI�WKLV�WR�HVWDEOLVK�D�SDWWHUQ�´

7KH�UHVHDUFK�WHDP��ZKLFK�KDV�EHHQ�LQYHVWLJDWLQJ�WKH�FU\SWRJUDSK\�SUREOHPV�VLQFH�ODVW�-XO\�

LV�EHLQJ�FRQWDFWHG�E\�RQH�YLFWLP�RI�WKLV�NLQG�RI�IUDXG�HDFK�ZHHN�

0U�$QGHUVRQ�VDLG�WKH�UHVHDUFK�WHDP�KDG�FRQWDFWHG�EDQNV�HDUOLHU�WKLV�\HDU�WR�LQIRUP�WKHP

RI�WKH�IODZ��6RPH�EDQNV��KH�VDLG��KDG�UHSRUWHG�DOUHDG\�EHLQJ�VXVSLFLRXV�RI�WKH�VWUHQJWK�RI

FU\SWRJUDSK\�EHLQJ�XVHG�LQ�WKH�FKLS�DQG�SLQ�V\VWHP�

7KH�8.�ZDV�RQH�RI�WKH�HDUO\�DGRSWHUV�RI�FKLS�DQG�SLQ�WHFKQRORJ\��KDYLQJ�LQWURGXFHG�LW�IURP

Page 9: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Protocol overview (as used in the UK)

Card→ PED• Card details (account number, cardholder name, expiry, etc.)• Public key certificate and static digital signature• Copy of the magnetic strip details∗

PED→ Card• Transaction description (value, currency, type, unpredictable

number)• PIN as entered by customer∗

Card→ PED• PIN verification result and authorisation code

Page 10: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Terminal tamper proofing is supposedto protect the PIN in transit

• In PoS transaction, PIN is sent from PINentry device (PED) to card for verification

• Various standard bodies require thatPEDs be tamper proofed: Visa, EMV, PCI(Payment Card Industry), APACS (UKbank industry body)

• Evaluations are performed towell-established standards (CommonCriteria)

• Visa requirement states that defeatingtamper-detection would take more than 10hours or cost over USD $25,000 per PED

Page 11: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Protection measures: tamper switches

Ingenico i3300

Page 12: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Protection measures: tamper switches

Ingenico i3300

Page 13: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Protection measures: tamper meshes

Ingenico i3300

Page 14: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Protection measures: tamper meshes

Ingenico i3300

Page 15: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

BBC Newsnight filmed ourdemonstration for national TV

BBC Newsnight, BBC2, 26 February 2008

Page 16: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Holes in the tamper mesh allow thecommunication line to be tapped

An easily accessible compartment can hide a recording device

Page 17: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

This type of fraud is still a seriousproblem in the UK

Initially (2005), PEDs weretampered on a small scale andinstalled by someoneimpersonating a service engineer

PED was collected later, and carddetails extracted

Now PEDs are being tamperedwith at or near their point ofmanufacture

A cellphone module is inserted soit can send back lists of cardnumbers and PINs automatically

Page 18: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Chip & PIN vulnerabilities

• Fallback vulnerabilities are not strictly-speaking a Chip & PINvulnerability

• However, vulnerabilities do exist with Chip & PIN• To understand these, we need some more background

information• To pay, the customer inserts their smart card into a payment

terminal• The chip and terminal exchange information, fulfiling three goals:

• Card authentication: that the card presented is genuine• Cardholder verification: that the customer presenting the card is

the authorized cardholder• Transaction authorization: that the issuing bank accepts the

transaction

Page 19: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Terminology

Issuing bank

Cardholder

Acquiring bank

Merchant

Payment system network(MasterCard/Visa/etc.)

Page 20: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Terminology

Issuing bank

Cardholder

Acquiring bank

Merchant

Payment system network(MasterCard/Visa/etc.)

Card presented

AuthorizationCard issued

Authorization

Page 21: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Terminology

Issuing bank

Cardholder

Acquiring bank

Merchant

Payment system network(MasterCard/Visa/etc.)

Card presented

AuthorizationCard issued

Authorization

Goods received

PaymentPayment

Payment

Page 22: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Simplified Chip & PIN transaction

1. Card details; digital signature $$$

PIN

transaction;cryptogram

result$ 5. Online transaction authorization (optional)

card

merchant

2. PIN entered by customer

3. PIN entered by customer; transaction description

4. PIN OK (yes/no); authorization cryptogram

customer

issuer

Page 23: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The YES-card attack

• Criminals can copy EMVchip cards

• This fake card willcontain the correctdigital signature

• Also, it can beprogrammed to acceptany PIN (hence “YES”)

• However, the fake cardcan be detected byonline transactionauthorization

Page 24: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The YES-card attack

1. Card details; digital signature $$$

0000

$

fakecard

merchant

2. Wrong PIN entered by crook

3. Wrong PIN entered by crook; transaction description

4. PIN OK (yes); Wrong cryptogram

crook

issuer

Page 25: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Defending against the YES-card

• YES-cards are responsible for a relatively small amount of fraud• Can be detected by online transaction authorization• Can also be detected by more advanced chip cards which can

produce a dynamic digital signature• DDA (dynamic data authentication), as opposed to SDA (static

data authentication)• Previously DDA cards were prohibitively expensive, but now cost

about the same as SDA cards• PIN verification can be performed online too, rather than allowing

the card to do so• Need to securely send the PIN back to the issuer• UK ATMs use online PIN verification• UK point-of-sale terminals use offline PIN verification

Page 26: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The relay attack: Alice thinks she ispaying $20, but is actually charged

$2 000 for a purchase elsewhere

Dave

PIN

Alice

$

Honest cardholder Alice and merchant Dave are unwitting participants in therelay attack

22a/40

Page 27: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The relay attack: Alice thinks she ispaying $20, but is actually charged

$2 000 for a purchase elsewhere

PIN

$2000$20

PIN

attackers can be on oppositesides of the world

Dave

Carol

AliceBob

$

Alice inserts her card into Bob’s fake terminal, while Carol inserts a fakecard into Dave’s real terminal. Using wireless communication the $2 000purchase is debited from Alice’s account

22b/40

Page 28: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The distance bounding protocol indetail...

nonce (Np)

nonce (Nv)

"prover"

K

"verifier"

$

K

We use the Hancke-Kuhn protocol, which we adapted to a wired,half-duplex implementation considering EMV constraints: a two wireinterface and cheap prover– the protocol starts with a mutual exchange of nonces.

23a/40

Page 29: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The distance bounding protocol indetail...

nonce (Np)

nonce (Nv)

"prover"

K

"verifier"

$

K

shift register 0

shift register 1

split

MACK{Nv,Np}

response bits

challenge bits

MACK{Nv,Np}

– MACs are computed under shared key;– verifier loads a shift register with random bits;– prover splits MAC into two shift registers.

23b/40

Page 30: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The distance bounding protocol indetail...

nonce (Np)

nonce (Nv)

"prover"

K

"verifier"

$

K

shift register 0

shift register 1

split

MACK{Nv,Np}

response bits

challenge bits

MACK{Nv,Np}

single-bit challenge

single-bit response

shift register 0

shift register 1response bits

challenge bits

Timing critical phase:– single bit challenge-response pairs are exchanged;– response bit is the next bit from the shift register corresponding tothe challenge bit’s content;– response bit is deleted at prover and stored at verifier.

23c/40

Page 31: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The distance bounding protocol indetail...

nonce (Np)

nonce (Nv)

"prover"

K

"verifier"

$

K

shift register 0

shift register 1

split

MACK{Nv,Np}

response bits

challenge bits

MACK{Nv,Np}

single-bit challenge

single-bit response

shift register 0

shift register 1response bits

challenge bits

verifyresult

The verifier checks that the responses are correct and concludes,based on its timing settings, the maximum distance the prover is away

23d/40

Page 32: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The no-PIN attack

• The no-PIN attackallows criminals to use astolen card withoutknowing its PIN

• It requires inserting adevice between thegenuine card andpayment terminal

• This attack works evenfor online transactions,and DDA cards

Page 33: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

BBC Newsnight filmed ourdemonstration for national TV

BBC Newsnight, BBC2, 11 February 2010

Page 34: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

The no-PIN attack

1. Card details; digital signature $$$

0000

transaction;cryptogram

result$ 5. Online transaction authorization (optional)

fakecard

merchant

2. Wrong PIN entered by crook

3. Wrong PIN entered by crook; transaction description

4. PIN OK (yes); authorization cryptogram

crook

issuer

card1/3/4. Card details; digital signature PIN; transaction description PIN OK; cryptogram

Page 35: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Current and proposed defences

• Skimming• iCVV: Slightly modifying copy of magnetic strip stored on chip• Disabling fallback: Preventing magnetic strip cards from being

used in EMV-enabled terminals• Better control of terminals: Prevent skimmers from being installed

• YES-card• Dynamic Data Authentication (DDA): Place a public/private

keypair on every card• Online authorization: Require that all transactions occur online

• No-PIN attack• Defences currently still being worked on• Extra consistency checks at issuer may be able to spot the attack• Combined DDA/Application Cryptogram Generation (CDA): Move

public key authentication stage to the end

Page 36: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Deployment of Chip and PIN• Chip and PIN was expensive for both all parties• Deployment was encouraged through “liability engineering”

Terminal

Card magstrip chip chip & PIN

magstrip Issuer Issuer Issuerchip Acquirer Issuer Issuerchip & PIN Acquirer Acquirer Issuer

• Liability pushed down the chain: acquirer→ merchant;issuer→ customer

• Led to rapid deployment, but this caused some problems• Still took 10 years

Page 37: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Random numbers?

Date Time UN

2011-06-29 10:37:24 F1246E04

2011-06-29 10:37:59 F1241354

2011-06-29 10:38:34 F1244328

2011-06-29 10:39:08 F1247348

Page 38: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Reverse engineering

Page 39: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

NCR ATM

Page 40: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Triton ATM (CPU board)

Page 41: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Triton ATM (DES board)

Page 42: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Surveying the problem

Page 43: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Characteristic C

SRC2 EXP6 SRC2 EXP6B

0 77028437 0 5D01BBCF

1 0D0AF8F9 1 760273FE

2 5C0E743C 2 730E5CE7

3 4500CE1A 3 380CA5E2

4 5F087130 4 580E9D1F

5 3E0CB21D 5 6805D0F5

6 6A05BAC3 6 530B6EF3

7 74057B71 7 4B0FE750

8 76031924 8 7B0F3323

9 390E8399 9 630166E1

Page 44: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Other ATMs

Counters Weak RNGs

ATM4 eb661db4 ATM1 690d4df2

ATM4 2cb6339b ATM1 69053549

ATM4 36a2963b ATM1 660341c7

ATM4 3d19ca14 ATM1 5e0fc8f2

ATM5 F1246E04 ATM2 6f0c2d04

ATM5 F1241354 ATM2 580fc7d6

ATM5 F1244328 ATM2 4906e840

ATM5 F1247348 ATM2 46099187

ATM3 650155D7

ATM3 7C0AF071

ATM3 7B021D0E

ATM3 1107CF7D

Page 45: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

POS terminal

Stronger RNGs

POS1 013A8CE2

POS1 01FB2C16

POS1 2A26982F

POS1 39EB1E19

POS1 293FBA89

POS1 49868033

Page 46: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Cashing out

• Pre-play card: load with ARQCs for expected UNs• Malware attack: tamper with ATM or POS terminal to produce

predictable UNs• Tamper with ATMs or POS in supply chain• Collusive merchant, modifies software• Tamper with communications

Page 47: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Mitigating the attack

• Detection:• Suspicious jumps in transaction counter• Lack of issuer authentication

• Prevention:• Relying party (issuer) generates the UN• Audit trail shows where UNs came from

• Industry response so far has been mixed• Details disclosed in early 2012• Some surprised by the problem• Others less so• Some knew of this problem but did not admit it

Page 48: Banking security: attacks and defences - Steven MurdochSome proposed attacks still work: relay, no-PIN Others are being marginalized, but still work sometimes: yes-card, fallback Lack

Conclusions

• Chip and PIN is far from secure: the card is probably thestrongest part

• The complicated business relationships between parties makesanalysing security complex

• Some proposed attacks still work: relay, no-PIN• Others are being marginalized, but still work sometimes:

yes-card, fallback• Lack of understanding, and deliberate overstatement of security

leads to customers being defrauded

More details and paper: http://www.lightbluetouchpaper.org/