📜 ⬆️ ⬇️

German security experts have discovered a vulnerability in the protocol of payment terminals

image

Security specialist Karsten Nohl, founder of Security Research Labs, made a statement about the vulnerability of the data transfer protocol through which payment pos-terminals transmit bank card data. In front of an astonished RT correspondent, Security Research Labs employees hacked the pin-code of his card and made it a clone. At the same time, the correspondent used a chip card.

According to Nol, the problem lies not in the malfunctioning of devices, but in the vulnerabilities of the protocol itself. In this regard, it is necessary to change the entire system - which is expensive and unprofitable, at least until the hacking has become widespread.

Nol and his team tried to attract the attention of banks to this problem. But those, although they recognize it, are not going to take any action. “Companies responsible for the absence of such vulnerabilities, including the very same banks, recognize its presence, but do not react at all. - asserts nol. “They say:“ there haven't been any hacks yet, ”but it's just a matter of time.”
')


Unfortunately, the RT report lacks technical details of hacking. Apparently, the vulnerability applies to wireless terminals that communicate with the common base via WiFi.

Nol was already famous for exposing a vulnerability when in the summer of 2013 he announced the discovery of a SIM-card vulnerability with the Data Encryption Standard (DES). This is an outdated standard, which, however, is used by a large number of manufacturers, and hundreds of millions of SIM-cards support DES.

Source: https://habr.com/ru/post/356976/


All Articles