Chip & PIN broken (for you Euros)

N&P: Discuss governments, nations, politics and recent related news here.

Moderators: Alyrium Denryle, Edi, K. A. Pital

Post Reply
User avatar
Beowulf
The Patrician
Posts: 10621
Joined: 2002-07-04 01:18am
Location: 32ULV

Chip & PIN broken (for you Euros)

Post by Beowulf »

Original article wrote: Chip and PIN is broken

February 11th, 2010 at 18:09 UTC by Ross Anderson

There should be a 9-minute film on Newsnight tonight (10:30pm, BBC Two) showing some research by Steven Murdoch, Saar Drimer, Mike Bond and me. We demonstrate a middleperson attack on EMV which lets criminals use stolen chip and PIN cards without knowing the PIN.

Our technical paper Chip and PIN is Broken explains how. It has been causing quite a stir as it has circulated the banking industry privately for over 2 months, and it has been accepted for the IEEE Symposium on Security and Privacy, the top conference in computer security. (See also our FAQ and the press release.)

The flaw is that when you put a card into a terminal, a negotiation takes place about how the cardholder should be authenticated: using a PIN, using a signature or not at all. This particular subprotocol is not authenticated, so you can trick the card into thinking it’s doing a chip-and-signature transaction while the terminal thinks it’s chip-and-PIN. The upshot is that you can buy stuff using a stolen card and a PIN of 0000 (or anything you want). We did so, on camera, using various journalists’ cards. The transactions went through fine and the receipts say “Verified by PIN”.

It’s no surprise to us or bankers that this attack works offline (when the merchant cannot contact the bank) — in fact Steven blogged about it here last August.

But the real shocker is that it works online too: even when the bank authorisation system has all the transaction data sent back to it for verification. The reason why it works can be quite subtle and convoluted: bank authorisation systems are complex beasts, including cryptographic checks, account checks, database checks, and interfaces with fraud detection systems which might apply a points-scoring system to the output of all the above. In theory all the data you need to spot the wedge attack will be present, but in practice? And most of all, how can you spot it if you’re not even looking? The banks didn’t even realise they needed to check.

This attack is both academically and practically significant. We get reports weekly from different victims of phantom withdrawals, and these include large numbers of stolen cards used to make purchases in the window between theft and the cancellation of the card. Currently these victims are denied refunds by their banks, but this attack could explain some of the frauds we are seeing. The fact the receipt says “PIN Verified” when actually it wasn’t raises a whole load of legal and evidential questions which call into question the banking industry’s claim that their systems work (and log) properly. Merchants will be none too pleased either; the system no longer protects their interests but only those of the issuing bank.

There’s been some confusion, possibly even misinformation, about our attack and its effects. Cartes Bancaires in France were so concerned that they briefed the press way in advance of our plans for publication. We can set the record straight on a few things:

* the attack applies to cards used online (where the merchant POS contacts the bank) as well as offline;

* the attack works regardless of the amount of money spent (not just for small value amounts that are below floor limit);

* the attack doesn’t work once a card has been cancelled by the bank — just like stolen cards in the past can only be used for a certain window of time once the cardholder discovers the loss;

* the attack doesn’t work at ATMs (cash machines);

* the failure applies to bank card schemes based on EMV – the most widely deployed standard for smartcard payments. Older national smartcard schemes may or may not be vulnerable; we don’t know.

So what went wrong? In essence, there is a gaping hole in the specifications which together create the “Chip and PIN” system. These specs consist of the EMV protocol framework, the card scheme individual rules (Visa, MasterCard standards), the national payment association rules (UK Payments Association aka APACS, in the UK), and documents produced by each individual issuer describing their own customisations of the scheme. Each spec defines security criteria, tweaks options and sets rules – but none take responsibility for listing what back-end checks are needed. As a result, hundreds of issuers independently get it wrong, and gain false assurance that all bases are covered from the common specifications. The EMV specification stack is broken, and needs fixing.

We’re really worried that if something isn’t done to fix this problem, and the many others we’ve found in EMV, other regions adopting it (like the USA) are going to make the same mistakes again and again – and that means customers stay vulnerable.

That’s why again we’re arguing that Chip and PIN is broken. We don’t want people keeping their money in shoe boxes – we want the problems fixed. That means getting decent governance for the system that involves all the stakeholders – banks, regulators, merchants and customers.
So, yeah. It's now highly advisable to never carry your ATM card unless you're actually going to get cash. You = hosed if someone steals your card. Banks will claim that since the merchant's receipt has "PIN verified" on it, they knew your PIN, and therefore you authorized it, and refuse to make refunds.

Video at the link.
"preemptive killing of cops might not be such a bad idea from a personal saftey[sic] standpoint..." --Keevan Colton
"There's a word for bias you can't see: Yours." -- William Saletan
User avatar
Dominus Atheos
Sith Marauder
Posts: 3904
Joined: 2005-09-15 09:41pm
Location: Portland, Oregon

Re: Chip & PIN broken (for you Euros)

Post by Dominus Atheos »

Beowulf wrote:So, yeah. It's now highly advisable to never carry your ATM card unless you're actually going to get cash. You = hosed if someone steals your card. Banks will claim that since the merchant's receipt has "PIN verified" on it, they knew your PIN, and therefore you authorized it, and refuse to make refunds.
So just to be clear, that's only for Europe right? Because I don't know about yurps but my ATM card is also my debit card and I use that pretty much exclusively to pay for things. The only things I use cash for is the vending machines at my work.
User avatar
Stark
Emperor's Hand
Posts: 36169
Joined: 2002-07-03 09:56pm
Location: Brisbane, Australia

Re: Chip & PIN broken (for you Euros)

Post by Stark »

It just means the security is broken; junkies can't use your card but pros can. Pretty much status quo.

The idea you should never carry your card is absurd. You should never LOSE your card and if you do you should cancel it. This is not banking system in peril.
User avatar
The Kernel
Emperor's Hand
Posts: 7438
Joined: 2003-09-17 02:31am
Location: Kweh?!

Re: Chip & PIN broken (for you Euros)

Post by The Kernel »

As someone who holds a couple of patents in the field of multi-factor authentication, I find this quite hilarious to see. The whole concept behind MFA is independent systems that need independent verification--no authentication system should be able to locally override them like this.

Banks are funny creatures about their security models as they talk a big game and make all of their partners live up to incredible levels of security for anything they build for them, but any internal development is basically exempt from the crushing security audits as they feel it would be a competitive disadvantage.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Re: Chip & PIN broken (for you Euros)

Post by phongn »

Visa and MasterCard are trying to roll out their own implementations of a system called 3D Secure (3DS); unfortunately, it's seriously flawed.[1] The Kernel is quite right; none of the banks actually want to "walk-the-walk" in terms of security.

[1] Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication (PDF)
User avatar
The Kernel
Emperor's Hand
Posts: 7438
Joined: 2003-09-17 02:31am
Location: Kweh?!

Re: Chip & PIN broken (for you Euros)

Post by The Kernel »

Verified by Visa and MasterCard SecureCode are funny beasts--they were initially developed to solve the problem of large "card not present" sales through online merchants for which the value proposition is unquestionable for the merchant. Merchants typically have to bear all the chargeback risk for card transactions (which makes you wonder what the 2.5% fee is actually FOR, but that's a different rant altogether...) but the system itself doesn't seem to provide any meaningful chargeback protection against professional or "friendly" fraud as the acquiring bank has a lot of latitude in what sort of information they use to verify the transaction.

True MFA for online transactions is the proper way to go here. Most people don't understand that true multi-factor authentication isn't just having two separate pieces of data, rather it relies on the idea that you have to prove your payment method using two things:

1) Something you have. A physical card swipe at a merchant would be an example of this.
2) Something you know. A PIN that only the cardholder knows would be an example of this.

If you look at most card transactions (either virtual or in person) it's easy to see how very few card processing methods get this right. Sure there are PIN debit transactions, but credit cards don't do PIN debit and you can't do PIN debit for online transactions as none of the debit networks will allow virtual card terminals (although the company I work for has done a few direct bank integrations using this technology as proof-of-concepts).

Verified by Visa and MasterCard SecureCode is obviously not a true MFA scheme as it only relies on two "Something you know" pieces of data rather than a "Something you have" factor. The future as I see it involves using mobile phones for MFA by sending a one-time token over SMS to the cell phone number of the card holder, and then having them verify it with the merchant. This solves a lot of problems but it does require reliable SMS delivery to work. Banks are starting to realize this too as some big institutions like Chase are already using SMS to do MFA for site login and it's only a matter of time before the acquiring banks start pushing the card associations to use it in their merchant programs.
JointStrikeFighter
Worthless Trolling Palm-Fucker
Posts: 1979
Joined: 2004-06-12 03:09am
Location: Brisbane, Australia

Re: Chip & PIN broken (for you Euros)

Post by JointStrikeFighter »

SMS delivered one time authentication is reasonably common for online bank stuff.
Post Reply