Vulnerabilities Can Allow Hackers To Bypass £30 On Visa Contactless Limit

By   ISBuzz Team
Writer , Information Security Buzz | Jul 30, 2019 02:24 am PST

Security researchers have discovered flaws that could allow hackers to bypass the UK contactless verification limit of £30 on Visa contactless cards. The researchers, from Positive Technologies, tested the attack with five major UK banks, successfully bypassing the UK’s £30 limit (which is used to safeguard against fraudulent losses) on all tested Visa cards, irrespective of the card terminal. They also found that this attack is possible with cards and terminals outside of the UK.

Subscribe
Notify of
guest
2 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Laurie Mercer
Laurie Mercer , Security Engineer
July 30, 2019 10:48 am

This attack allows contactless verification limits to be easily bypassed if an attacker has physical access to a card.

To reduce the risk of being scammed, people should never let their cards go out of sight. If you notice that your card is missing, you should freeze your card using your banking mobile app immediately. For an additional layer of security, consider placing an RFID Jammer in your wallet, pocket or handbag.

Banks are already in the process of implementing multi-factor authentication for payments. This vulnerability puts more pressure to deploy Strong Customer Authentication (SCA) for non low value payments as soon as possible.

Last edited 4 years ago by Laurie Mercer
Frederik Mennes
Frederik Mennes , Director of Product Security
July 30, 2019 10:34 am

This attack requires the adversary to manipulate the data flow between the payment terminal and the payment card, which requires the them to be in very close proximity to both the terminal and payment card, which limits the scalability of the attack. The most practical way to implement the attack probably consists of adding an extension to the terminal that acts as a man-in-the-middle between the terminal and card. The extension should look as if it is a genuine part of the terminal, and this is similar to skimming attacks against magstripe-based payment cards, whereby a fake terminal is used to read the content of a card\’s magstripe.

Banks, merchants and consumers should do the following to prevent this type of attack:

Banks should analyse financial transactions for all payments that they process, and try to identify fraudulent transactions as much as possible
Merchants should inspect their payment terminals regularly and make sure there are no extensions to it. Consumers should also look for strange additions to payment terminals.
Consumers should keep their payment card in a screening wallet, so that it cannot be read inadvertently. They should also enable SMS notifications for new payments and contact their bank immediately if they notice a suspicious payment.

Last edited 4 years ago by Frederik Mennes

Recent Posts

2
0
Would love your thoughts, please comment.x
()
x