advertisement
advertisement

This is page 3 of:

Chip-And-PIN Hack Is So Scary Because It Surprised No One

February 18th, 2010

The most comprehensive—albeit mysterious—attack on the Cambridge report was contained in a story from SecureIDNews. This story said that, “The Smart Card Alliance has reviewed the hack along with other industry organizations and concluded that widespread implementation of this attack is unlikely.” The mysterious part is that, according to Smart Card Alliance Spokeswoman Deb Montner, the Smart Card Alliance–to her knowledge–has reached no such conclusions and has issued no such statement.

Well, no matter its source, the points are reasonable enough challenges of some of the Cambridge University report’s details. First are questions about the practicality of using a stolen EMV card before the card is reported missing. The SecureIDNews story also said the hack damage potential couldn’t extent to ATMs for cash withdrawals, “as ATMs rely on an online PIN verification.”

The report attributed to the Smart Card Alliance also raised two weaker challenges, namely that the attack couldn’t work in the real world (something the BBC video of it happening in the real world tends to disprove) and that “the attack is technically difficult, requiring highly sophisticated software and customized hardware that could only be created by individuals with extensive knowledge of EMV protocols.” Cyberthiefs with a shot at the millions of British EMV cards? They tend to be very quick studies and, by the way, will be much better funded than a university research team.

DSW’s Black also questioned this shortcoming, saying that it flies in the face of the history of cyberthief gangs. “Cookie-cutter solutions are only a matter of time. By way of example, look at PIN pad skimmers and the multitude of hacking frameworks and tools that require little or no knowledge of the underlying protocols,” he said.

Another attack of the report attributed to the Smart Card Alliance said: “Such an attack would not compromise the smart card, as the PIN would still remain secure inside the card.” Black argued that this defense misses the point: “With this attack, knowledge of the PIN is extraneous.”

To a major extent, these are all—on both sides—nitpicks. The big-picture point is that this Cambridge report makes it clear how flawed chip-and-PIN currently is. Can these flaws be fixed? Yes, and rather quickly, too. But should the payments industry sit around and wait for a university to point out huge security holes?

If the industry was more stunned by these revelations, it would be more comforting. But the muted reactions confirm that holes of this nature are well known. Not the specific holes, perhaps. But it’s not a surprise to anyone that the protocol was not written with airtight security in mind.

It reminds me of my early reporting career, when I spent years investigating semi-corrupt government agencies and politicians in New Jersey. The surprise was never that a particular politician was crooked. Rather, it was that someone had bothered to prove it.


advertisement

7 Comments | Read Chip-And-PIN Hack Is So Scary Because It Surprised No One

  1. bill bittner Says:

    This hack demonstrates a much larger vulnerability that goes way beyond payment authorization. As software design has moved to “object oriented” designs that encapsulate data and processes along with the whole concept of “stateless objects” the “man in the middle” or wedge attack becomes much easier. This could really happen in any situation. Just as we are hearing more about cyber attacks from overseas, we are using software design techniques that make our systems more vulnerable. Better get a kerosene lamp.

  2. R Dallaire Says:

    I worked on EMV project in Canada. EMV is better than plain MSR card. No doubt. This is not marketing “gimmick”.

    The Cambridge/BBC video shows a guy using a Netbook PC and an EMV “test card” hooked on a stolen EMV card. Sure, you may hide all the cables

  3. R Dallaire Says:

    Sure, you may hide all the cables but the setup will be obvious if you are wearing a T-Shirt. ;)

    EMV has to fix this. I don’t know if the same issue has been raised in Canada.

  4. A reader Says:

    Mr. Bittner,

    How do you equate the failure of a developed-in-secret, 14-year-old cryptographic protocol with the adoption of object oriented programming, the recognition of design patterns, or the maturity of software engineering as a discipline? You are comparing oranges to a philosopher’s left elbow — the argument doesn’t even parse.

    There were no software failures here, no code crashes being exploited nor buffer overrun attacks smashing stacks. This was a failure in the design and creation of a *protocol* that fell prey to being spoofed. No objects failed, because no objects were transmitted. This is 100% protocol design failure; and it can be blamed on the secretive nature of the original design process and the immature cryptographic skills of the original protocol designers. (Here’s a hint for all you budding cryptographers: the best cryptographers know they aren’t good enough by themselves. They always seek outside validation of their designs. Always.)

    The chips inside the smart cards don’t even have the memory or the horsepower to support object oriented programming techniques. There aren’t dynamic memory allocations. These are tiny 8-bit chips with about 1K of RAM, and the applications hand coded in assembler (or possibly C.)

    I’m sorry if you are uncomfortable with modern design techniques, object oriented languages, test-driven development, design patterns, or if you think programming should still be functional now because it was functional back when you first learned it. If you are interested in that kind of bare-metal programming, might I suggest embedded systems design? It’s all about writing code for these tiny standalone processors, where every byte still matters and every cycle still counts. You even get style points for writing in assembler. :-)

  5. David Dorf Says:

    Long ago I used to write code for smart card terminals, including those that accepted EMV cards. Even with the imperfections, the chip-based systems are much more secure than mag-stripe. The fact that this particular hole went undiscovered for at least six years is actually pretty impressive. Although I don’t know the specifics, I’m willing to bet this particular issue can be resolved in the terminal code without having to reissue all the cards.

    This is a great example of the importance of ethical hacking. Hats off to the Cambridge team.

  6. Steve Sommers Says:

    Was it undiscovered? And are we sure there are variations already in the wild? There have been many customer complaints of fraudulent activity with EMV and most were simply swept under the carpet and attributed to a failure of the cardholder without much investigation. Recently the EU shifted some of the burden of proof back to the banks and this was done prior to this Cambridge report. If the system is so secure, why the shift?

  7. Howard Says:

    This hack has been available for over 8 years now. I doubt this should be a surprise to anyone.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.