advertisement
advertisement

Visa’s PIN-Entry Bulletin Asks For Bluetooth Signal/Pairing Scans

Written by Evan Schuman
September 7th, 2011

When Visa issued new security guidelines this month to deal with compromised PIN-entry devices, it asked that retailers “periodically scan for any unidentified Bluetooth signals and pairings at store locations,” a move that goes beyond current PCI requirements. Hints of a possible PCI 2.1 rule?

The September 1 Visa Bulletin was primarily to tell merchants that five VeriFone units (Everest Plus units P003-400-01, P003-400-02, P003-400-03, P003-400-12 and P003-400-013) have been ruled “susceptible to compromise” and were indeed “used in tampering and skimming attacks” in the U.S. The list had already included other VeriFone units plus one from Ingenico (the eN-Crypt 2400, also known as the C2000 Protégé) and two from Hypercom (S7S and S8).

“Visa has also received new reports regarding POS PED thefts from merchant locations. This type of fraud typically occurs in merchant locations operating after hours with minimal customer traffic or employee supervision over cash registers; however, any store may be affected by this scheme,” the bulletin said. “Recent evidence indicates that these devices were physically removed during business hours and replaced with modified devices designed to skim account and PIN data, which was then transmitted wirelessly to the fraudsters via Bluetooth. In most cases, surveillance footage showed that the suspects were able to remove and install a modified POS PED in seconds.”

Walter Conway, StorefrontBacktalk‘s PCI columnist and a QSA for 403Labs, said the Visa Bulletin is a good one, but he thought it was interesting because of what it did not say. “The bulletin points out what the merchant learned from the video. What they don’t say is how long it took someone to watch/monitor the video and find out what happened.”

Conway added that the Bluetooth scanning suggestion was wise. “I liked the part about scanning for rogue Bluetooth networks. PCI already requires similar scanning (Req 11) for Wi-Fi,” he said. “How long does it take a manager to walk around their POS looking for Bluetooth networks you don’t expect? How about using your smartphone? It’s not required by PCI, but who said PCI was your entire security policy?”

Mostly, though, the bulletin stated obvious security methods. And yet, the measures—which included weighing the equipment, checking for missing screws, altered seals or extraneous wiring, in addition to verifying the identities of any repair technicians—are worth a reminder or two.

“The onus remains on the merchant to be vigilant. You can’t outsource security in your store any more than you can outsource it at home. It’s part of your job,” Conway said. “POS staff—assuming they are not part of the bad guys’ plan—should be trained to observe and report when the POS looks ‘different.’ Automated systems should detect immediately when a device is removed or an unapproved one attached. It would be good if the system generated an alert, cut off the device and maybe even had somebody respond to/acknowledge the alert.”


advertisement

3 Comments | Read Visa’s PIN-Entry Bulletin Asks For Bluetooth Signal/Pairing Scans

  1. Biff Matthews Says:

    One simple, inexpensive method to prevent such theft by replacement is to secure the terminal or PED to the counter with a lock down device requiring a manager with a key to unlock the device for service or swap out. We recommend securing BOTH terminal and PED because customers have had terminal stolen resulting in the thieves loading prepaid cards by running credits through the stolen terminal deducting the monies from the merchant’s checking account.

  2. A reader Says:

    A simple bolt and two nuts tightened against each other, requiring a minute under the counter with a pair of wrenches to release, is also a cheap and effective deterrent.

    But this scenario continues to highlight why any card technology that requires trusting the merchant terminals is inherently flawed. Sealed, bank-issued personal payment devices in a credit card form factor with an on-board authentication device and an air-gapped authorization method are the only way this arms race will end well. Everything else, including chip and pin, is just kicking the can down the street until the next flawed “great idea” is hacked.

  3. ed Says:

    I believe the main points are being missed here. If I’m capable of replacing your PEDs, most likely I’m the manager or in charge of security in your store or affiliated with them.

    It does not take 2 seconds to swipe out a PED, these people, especially with the Aldi situation had plenty of time and access to accomplish their feat. So the physical solution is not going to work.

    In addition, just as well as fake handbags can be cloned, it is really easy to clone PED device with PVC machines over in Asia that look exactly like the PED and can still be intercepted before the machine can encrypt the card number at the magnetic swipe.

    The only real solution is a multi-factor that allows real-time access to transcations to compare against real-time sales in store to verification.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.