Black Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments

  /     /     /  
Publicated : 23/11/2024   Category : security


Black Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments


Researchers Leigh-Anne Galloway and Tim Yunusov chat about their work testing Visa’s contactless payments security system vulnerabilities.



Countless financial transactions are conducted every day by customers using contactless payment systems, and next month two security researchers from Positive Technologies will show
Black Hat Europe
attendees how vulnerable those transactions are to bad actors.
In their Black Hat Europe Briefing on
First Contact - Vulnerabilities in Contactless Payments
researchers Leigh-Anne Galloway and Tim Yunusov will show how they successfully bypassed (among other things) Visa’s £30 limit on contactless payments made via physical card in the United Kingdom. They’ll also demonstrate a few critical weak points in contactless payments, including flaws in key generation values and unpredictable numbers. 
I recently chatted with the pair about their work, what they’ve learned, and why it’s so important.
Alex: What do you hope to accomplish by giving this talk at Black Hat Europe?
Leigh-Anne:
There are probably two outcomes that wed like. The first is that payment security is a very under-subscribed area, so by talking at a venue like Black Hat, were hoping to interest other researchers in payments. There are incredibly high barriers, or at least it seems that way from the outside. But we want to show people that it is possible to work in this area.
Secondly, one thing we noticed is that even though we have this big growth in the financial sector, over the last year weve seen all these digital-only neo-banks spring up, and at the same time payments are being monopolized at the highest level. If you look under the surface of these new digital banks, a lot of them sit on the infrastructure of existing financial institutions, like other brick-and-mortar banks. And if you go higher up the levels of the payment infrastructure, it becomes more and more like a monopoly.
So when you dont have much competition, you stagnate in terms of standards. That means that people like Visa and MasterCard can dictate how they want to work and how they want to operate in the marketplace, and no one else regulates them, because they are the regulators of everyone else.
Alex: A Visa rep was quoted in a
Forbes article
responding to your research by suggesting it wasn’t a threat worth addressing. How do you feel about that response?
Leigh-Anne: 
Visa and MasterCard have slightly different stances on how they approach things; it is rather infuriating, and I would imagine that some of the banks feel a bit similar, because its them saying we cant be bothered to do anything about that, whereas if you reported a security issue to a big corporation like Google, even if the issue wasnt so significant, theyd probably resolve it rather than saying we dont want to do anything about it, go on your way.
For example, there isnt a formalized set of processes in the payment sector to deal with these things in the way that we see in bug bounty programs elsewhere, where you would formalize a process for how to categorize the risk of security issues, and how to resolve them.
But their stance is actually ... in a lot of cases Visa says, based on their own data (though they dont provide any clarity on what that data is) they say, based on our own data, we dont see applications of this attack in the wild, and therefore were not going to do anything about it.
When we look at this idea [banks promote] that contactless payment systems have resulted in fraud reduction, you find really different views. Visa just published a statement, at the same time that we released information about our research, to say that they had a 40% reduction in fraud in contactless payments over the last two years. But if you look at the footnote, it says the source is just Visa data and theres no explanation of the actual source.
If we look at data in the UK, if we look at the actionable data collected by the police, which is probably going to be on the conservative side because a lot of fraud doesnt get reported to police, there are some significant losses. So its really hard to know whats going on. 
Alex: What are you hoping Black Hat Europe attendees will get out of your talk?
Leigh-Anne:
In plain language, I always try to think of payments as something everyone interacts with every day, but yet we have very little knowledge about how they work. So with the work that we do, and the presentation were giving, were hoping to remove some of that mystery and encourage people to get involved in this area, because it is massively undersubscribed, and there is a lot of work to be done.
Do you think more financial institutions should be implementing bug bounty programs, the way many tech companies do?
Leigh-Anne:
I think it could be helpful. I think theres a different view among some of those newer banks, the neobanks, where were finding some of them have adopted a bug bounty approach. But most of them dont have any sort of formal framework. And if you look at the larger institutions, like HSBC, if you want to report a security issue to them, its almost impossible to work out how to do that.
I remember actually contacting customer services on chat and they said, Oh you can just tell us, and well pass along the information, which isnt the appropriate way to share that information. But these are some of the challenges that we face. So I think it would probably accelerate a security standard. I mean of course the financial industry is pretty heavily regulated, but those standards dont necessarily correlate strongly with security, as we know. You can be fully compliant and still be breached.
Learn more about Leigh-Anne and Tim’s Briefing (as well as lots of other cutting-edge content) in the
Briefings schedule
for Black Hat Europe, which returns to The Excel in London December 2-5, 2019.
For more information on what’s happening at the event and how to register, check out the
Black Hat website
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Black Hat Europe Q&A: Exposing the Weaknesses in Contactless Payments