{"id":12787,"date":"2016-08-17T09:00:24","date_gmt":"2016-08-17T13:00:24","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=12787"},"modified":"2020-04-10T15:03:16","modified_gmt":"2020-04-10T19:03:16","slug":"chip-and-pin-cards-insecure","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/chip-and-pin-cards-insecure\/12787\/","title":{"rendered":"Cards with chips are still vulnerable"},"content":{"rendered":"<p>The banking industry spends a lot of effort, time, and money to protect bank cards. For years, their protection consisted of embossed digits and a signature field, but now smart chips and one-time passwords stand guard between your money and the criminals who want it.<\/p>\n<p>The new chip and PIN cards (an <a href=\"https:\/\/en.wikipedia.org\/wiki\/EMV\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">EMV standard<\/a>) promised greater security than simple magnetic stripe cards, but no sooner were they deployed than criminals tried to break their protection. Fortunately, criminals are not the only ones testing them; security experts also investigate the systems. Company researchers probe for vulnerabilities in the equipment and architecture of payment systems, trying to find them and warn developers so that they can patch holes before criminals find a way in.<\/p>\n<p>The researchers\u2019 Black Hat presentation offered cause for both hope and anxiety: Yes, criminals <em>can<\/em> steal money from chip cards \u2014 but people are not helpless to protect themselves. Two employees of NCR Corp., a company that develops payment terminals and ATMs, <a href=\"https:\/\/threatpost.com\/researchers-bypass-chip-and-pin-protections-at-black-hat\/119637\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">presented<\/a> an attack at payment terminals commonly used in stores and gas stations. Using small and cheap Raspberry Pi computer, they inserted themselves into the communication between the store\u2019s main computer (roughly speaking, the cash register) and the payment module (roughly speaking, the PIN pad). <\/p>\n<p>In general, communication between these two systems has to be properly encrypted, but in many cases, the terminal is set up to use weak encryption. As a result, criminals can carry out <a href=\"https:\/\/www.kaspersky.com\/blog\/man-in-the-middle-attack\/1613\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">man-in-the-middle<\/a> attacks: They intercept communication data between the payment module and the main computer and decrypt it. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Unfortunately two-factor authentication can't save you from <a href=\"https:\/\/twitter.com\/hashtag\/banking?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#banking<\/a> Trojans <a href=\"https:\/\/t.co\/dEKfOWPaXo\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/dEKfOWPaXo<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/mobile?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#mobile<\/a> <a href=\"https:\/\/t.co\/hRP7WnTNmS\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/hRP7WnTNmS<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/708316552937000961?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The attack doesn\u2019t actually pull data though the basic security of a chip card; certain data, such as the PIN code, is encrypted on the chip and never transmitted openly. However, the attacker can obtain other information from the chip \u2014 data typically written on the magnetic stripe.<\/p>\n<p>In this way, criminals can find out the owner\u2019s name and card number and use that data to make online payments with the help of the victim\u2019s card. Of course, in that case, the criminals also need the CVV2 or CVC2 code from the back of the card \u2014 that is usually kept secret during data transmission. But criminals can try to trick cardholders into giving up the information.<br>\nIn addition to standard requests like \u201cInsert Card\u201d and \u201cEnter PIN,\u201d payment terminals can show a number of other notifications \u2014 a new request, for example, such as \u201cEnter your CVV2 (or CVC2).\u201d<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">ICYMI: Five lessons I\u2019ve learned from having my credit card hacked <a href=\"http:\/\/t.co\/dAQQfNXnE3\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/dAQQfNXnE3<\/a> <a href=\"http:\/\/t.co\/dSYKBglVgO\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/dSYKBglVgO<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/533624300302249985?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 15, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Here\u2019s another interesting approach: A criminal can add something like \u201cError, enter PIN again\u201d \u2014 but this time the terminal would think that it is asking for open, not secure, information. If this trick works, the terminal sends secure data as insecure and criminals obtain victims\u2019 PINs.<\/p>\n<p>Researchers have two simple tips for cardholders who want to stay safe. First, you should never enter your PIN twice in a transaction. If you see an error and get a request to enter your PIN again, cancel the transaction, take out the card, insert it again, and enter your PIN once more (and only once). You should also be vigilant and ignore any unusual questions asked by the payment terminal \u2014 especially if it is \u201cWhat is your CVC2\/CVV2?\u201d<\/p>\n<p>The second tip is not applicable in all countries, but it\u2019s interesting. NCR experts have a high opinion of mobile payment systems security (like Apple Pay), so paying with your watch or phone can be more secure than using the credit card.<\/p>\n<p>Of course, using good old cash is the best protection of all against banking and credit card frauds.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.<\/p>\n","protected":false},"author":32,"featured_media":12788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[964,722,770,1772,132,97],"class_list":{"0":"post-12787","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-bank-cards","9":"tag-banks","10":"tag-black-hat","11":"tag-chips","12":"tag-credit-cards","13":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/chip-and-pin-cards-insecure\/12787\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/chip-and-pin-cards-insecure\/7528\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/chip-and-pin-cards-insecure\/7552\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/chip-and-pin-cards-insecure\/7528\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/chip-and-pin-cards-insecure\/8959\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/chip-and-pin-cards-insecure\/8786\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/chip-and-pin-cards-insecure\/12790\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/chip-and-pin-cards-insecure\/2365\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/chip-and-pin-cards-insecure\/5989\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/chip-and-pin-cards-insecure\/6491\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/chip-and-pin-cards-insecure\/5257\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/chip-and-pin-cards-insecure\/8482\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/chip-and-pin-cards-insecure\/12355\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/chip-and-pin-cards-insecure\/12790\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/chip-and-pin-cards-insecure\/12787\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/chip-and-pin-cards-insecure\/12787\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/bank-cards\/","name":"bank cards"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12787"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12787\/revisions"}],"predecessor-version":[{"id":34814,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12787\/revisions\/34814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12788"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}