How Smartcard Payment Systems Fail. Ross Anderson Cambridge

Similar documents
Chip & PIN notes on a dysfunctional security system

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

What is EMV? What is different?

Banking Security Architecture

EMV and Small Merchants:

Electronic Payments Part 1

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

Why Cryptosystems Fail. By Ahmed HajYasien

Preparing for EMV chip card acceptance

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world

Understand the Business Impact of EMV Chip Cards

EMV FAQs. Contact us at: Visit us online: VancoPayments.com

Formal analysis of EMV

Relay attacks on card payment: vulnerabilities and defences

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper Executive Director, Product Development

Chip and PIN is Broken a view to card payment infrastructure and security

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV EMV TABLE OF CONTENTS

EMV : Frequently Asked Questions for Merchants

EMV Frequently Asked Questions for Merchants May, 2014

The EMV Readiness. Collis America. Guy Berg President, Collis America

What Merchants Need to Know About EMV

Payments Transformation - EMV comes to the US

HSBC Premier Debit Card User Guide. 13 N Bangkok, Thailand

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

EMV in Hotels Observations and Considerations

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world

A RE T HE U.S. CHIP RULES ENOUGH?

Payment systems. Tuomas Aura T Information security technology

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Electronic Payment Systems case studies

Credit card: permits consumers to purchase items while deferring payment

M/Chip Functional Architecture for Debit and Credit

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

The Canadian Migration to EMV. Prepared By:

Payment systems. Tuomas Aura T Information security technology. Aalto University, autumn 2012

How Secure are Contactless Payment Systems?

Guideline on Debit or Credit Cards Usage

EMV and Restaurants What you need to know! November 19, 2014

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Chip Card (EMV ) CAL-Card FAQs

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

HSBC Visa Debit Card. Making the most of your card. HSBC Customer Service Centre. Go to hsbc.com.au/debit

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

How To Protect A Smart Card From Being Hacked

Credit Card Processing Overview

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association

OpenEdge Research & Development Group April 2015

American Express Contactless Payments

Frequently asked questions - Visa paywave

SMARTCARD FRAUD DETECTION USING SECURE ONETIME RANDOM MOBILE PASSWORD

Extending EMV payment smart cards with biometric on-card verification

PayPass M/Chip Requirements. 10 April 2014

EMV FAQs for developers

Clear and Present Payments Danger: Fraud Shifting To U.S., Getting More Complex

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

CardControl. Credit Card Processing 101. Overview. Contents

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

FAQ on EMV Chip Debit Card and Online Usage

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

Formal models of bank cards for free

PCI and EMV Compliance Checkup

Visa Reloadable Frequently Asked Questions. EMV Travel Card

Plastic Cards: A Guide to Consumer Protection in the UK

Acquirer Device Validation Toolkit (ADVT)

Girl Scouts NC Coastal Pines Frequently Asked Questions Sage Credit Card Swipers

Protecting the POS Answers to Your Frequently Asked Questions

EMV (Chip-and-PIN) Protocol

Sending money abroad. Plain text guide

A Guide to EMV Version 1.0 May 2011

First Data s Program on EMV

U.S. Bank. U.S. Bank Chip Card FAQs for Program Administrators. In this guide you will find: Explaining Chip Card Technology (EMV)

EMV: A to Z (Terms and Definitions)

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Actorcard Prepaid Visa Card Terms & Conditions

increase your resistance How card not present gaming companies can minimise the risk of losing money through chargebacks

Introduction to Online Payment Processing and PayPal Payment Solutions

JCB Terminal Requirements

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments

PIN Pad Security Best Practices v2. PIN Pad Security Best Practices

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

Smart Cards for Payment Systems

To all GRSB debit and credit card customers:

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

Transcription:

How Smartcard Payment Systems Fail Ross Anderson Cambridge

The EMV protocol suite Named for Europay- MasterCard- Visa; also known as chip and PIN Developed late 1990s; deployed in UK ten years ago (2003 5; mandatory 2006) Europe, Canada followed About to be deployed in the USA (by 2015) FascinaYng story of failures and frauds Many lessons for security engineers!

Concept of operayons Make forgery harder by replacing the mag strip with a chip, which authenycates card Make authenycayon of cardholder stronger by replacing the signature with a PIN Keep verifying PINs online at ATMs, but verify on the chip at merchant terminals Encourage deployment by making the merchant liable if PIN not used ( liability shi[ )

Fraud history, UK Losses ( m) 0 50 100 150 200 250 300 Chip & PIN deployment period Card not present Counterfeit Lost and stolen Mail non receipt Cheque fraud ID theft Online banking 2004 2005 2006 2007 2008 2009 2010 2011 2012 Total, ex phone ( m) 503 491.2 591.4 704.3 529.6 441 410.6 462.7 Year Phone banking Cardholder liable if PIN used Else merchant pays Banks hoped fraud would go down It went up Then down, then up again

EMV shi[ed the landscape Like bulldozing a floodplain, it caused the fraud to find new channels Card- not- present fraud shot up rapidly Counterfeit took a couple of years, then took off once the crooks realised: It s easier to steal card and pin details once pins are used everywhere You can syll use mag- strip fallback overseas Tamper- resistance doesn t work

Adack the crypto EMV broke all the cryptographic hardware security modules in the world! A transacyon specified by VISA to send an encrypted key to a smartcard leaked keys instead See Robbing the bank with a theorem prover, Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L Rivest, Ross Anderson, SPW 2007 Ben now works for Square, Jol for Deutsche

Adack the opymisayons Cheap cards are SDA (no public key capability, so stayc ceryficate) A yes card can impersonate in an offline terminal Fairly easy to do, but not seen much

What about a false terminal? Replace a terminal s insides with your own electronics Capture cards and PINs from vicyms Use them to do a man- in- the- middle adack in real Yme on a remote terminal in a merchant selling expensive goods

The relay adack (2007)

Adacks in the real world The relay adack is almost unstoppable, and we showed it in TV in February 2007 But it seems never to have happened! So far, mag- strip fallback fraud has been easy PEDs tampered at Shell garages by service engineers (PED supplier was blamed) Then Tamil Tigers A[er fraud at BP Girton: we invesygate

Tamper- proofing of the PED In EMV, PIN sent from PIN Entry Device (PED) to card Card data flow the other way PED supposed to be tamper resistant according to VISA, APACS (UK banks), PCI Evaluated under Common Criteria Should cost $25,000 per PED to defeat

Tamper switches (Ingenico i3300)

and tamper meshes too

TV demo: Feb 26 2008 PEDs evaluated under the Common Criteria were trivial to tap Acquirers, issuers have different incenyves GCHQ wouldn t defend the CC brand APACS said (Feb 08) it wasn t a problem Khan case (July 2008)

The No- PIN adack How could crooks use a stolen card without knowing the PIN? We found: insert a device between card & terminal Card thinks: signature; terminal thinks: pin TV: Feb 11 2010

A normal EMV transacyon! -++*&# &(,0+) )&%/,%1)*2/- 1&34)2.&%5 6"#7/+*/(#)&%/,%1)*2/#%0)82&*9%)*2/#:24)*2/%+; %&#!'"()!"#$!"#$%&'#'()%*+,-#'*.*)%+#,*./%)0&(!!! A"#=>?#(/)(&('#@3#10,)25(&- ####)&%/,%1)*2/#'(,1&*4)*2/ B"#=>?#7C#:3(,D/2;- ####%0)82&*9%)*2/#1&34)2.&%5!*+),%&# "#$ <"#=>?#(/)(&('#@3#10,)25(&

A No- PIN transacyon

Blocking the No- PIN adack In theory: might block at terminal, acquirer, issuer In pracyce: may have to be the issuer (as with terminal tampering, acquirer incenyves are poor) Barclays blocked it July 2010 unyl Dec 2010 Real problem: EMV spec vastly too complex With 100+ vendors, 20,000 banks, millions of merchants a tragedy of the commons! Later bank reacyon: wrote to university PR department asking for Omar Chaudary s thesis to be taken down from the website Currently only HSBC seems to block it in the UK!

Card AuthenYcaYon Protocol Lets banks use EMV in online banking Users compute codes for access, authorisayon A good design would take PIN and challenge / data, encrypt to get response But the UK one first tells you if the PIN is correct This puts your personal safety at risk

Crime vicyms tortured for PINs

Phishing adacks?

Less suspicious than this

CAP adacks through wicked shops

EMV and Random Numbers In EMV, the terminal sends a random number N to the card along with the date d and the amount X The card computes an authenycayon request cryptogram (ARQC) on N, d, X What happens if I can predict N for d? Answer: if I have access to your card I can precompute an ARQC for amount X, date d

ATMs and Random Numbers (2) Log of disputed transacyons at Majorca: 2011-06- 28 10:37:24 F1246E04 2011-06- 28 10:37:59 F1241354 2011-06- 28 10:38:34 F1244328 2011-06- 28 10:39:08 F1247348 N is a 17 bit constant followed by a 15 bit counter cycling every 3 minutes We test, & find half of ATMs use counters!

ATMs and Random Numbers (3)

ATMs and Random Numbers (4)

The preplay adack Collect ARQCs from a target card Use them in a wicked terminal at a collusive merchant, which fixes up nonces to match Paper accepted at Oakland this year Since then, we have a live case Sailor spent 33 on a drink in a Spanish bar. He got hit with six transacyons for 3300, an hour apart, from one terminal, through three different acquirers, with ATC collisions

Back end failures too InteresYng case in R v Parsons, Manchester crown court, 2013 AuthorisaYon and sedlement are different systems with different transacyon flows AuthorisaYon reversals not authenycated How to take the banks for maybe 7.5m (and the banks only noyced 2.5m of it ) Parsons now a fugiyve from jusyce

In the UK we have no Reg E, and no breach reporyng laws

Adack scale Small: a specialist team can demonstrate it to a TV journalist Medium: a gang of crooks can take a few million before they get caught Large: scales to nine / ten figures and forces industry acyon Most of the discussed adacks are medium Large might be contained using analyycs

What does EMV hold for the USA? It looks like the effects of the liability shi[ will be miygated by Reg E, Reg Z, & the Fed Many banks may use chip- and- signature, as in Singapore Consumer protecyon might syll be undermined by payment innovayon, e.g. move from credit cards to PIN debit, or phone payments EMV with less liability shi[ will be an interesyng natural experiment!

Broader lessons Governance at global scale is hard EMVCo largely superseded by vendor lobby FeaturiYs can break anything! Issuers, acquirers have different interests (even if departments of the same bank) No- one represents the poor consumer Key: proper documentayon, including breach noyficayon and responsible vulnerability disclosure (NOT the EU NIS DirecYve!)

More Our 2014 IEEE Security & Privacy paper on the preplay adack Our 2012 IEEE Security & Privacy paper on the no- PIN adack See www.lightbluetouchpaper.org for our blog And hdp://www.cl.cam.ac.uk/~rja14/banksec.html Workshop on Economics and InformaYon Security (WEIS): next ediyon in the Netherlands, June 2015 My book Security Engineering A Guide to Building Dependable Distributed Systems