Samsung Pay Hack Lets Attackers Make Fraudulent Payments (theverge.com) 16
jmcbain writes: The Verge reports that a security researcher at DefCon outlined a number of attacks targeting Samsung Pay, Samsung's digital payment system that runs on their smartphones. According to the article, the attack "[focuses] on intercepting or fabricating payment tokens -- codes generated by the user's smartphone that stand in for their credit card information. These tokens are sent from the mobile device to the payment terminal during wireless purchases. [They expire 24 hours after being generated and are single-use only.]" In a response, Samsung said that "in certain scenarios an attacker could skim a user's payment token and make a fraudulent purchase with their card," but that "the attacker must be physically close to the target while they are making a legitimate purchase."
Re: COME VISIT NEW YORK (Score:1)
but... (Score:2, Insightful)
"the attacker must be physically close to the target while they are making a legitimate purchase."
s/the attacker/a skimming device planted by the attacker/
Since when has this ever been a hurdle for fraudsters?
Re: (Score:3)
Re: (Score:3)
Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools (November 17, 2014)
http://motherboard.vice.com/re... [vice.com]
NIGHTWATCH, RAGEMASTER, and SURLYSPAWN
Simple question (Score:1)
Forgive me if I'm being stupid, but I don't understand the summary. A single use token indicates that it can only be used once. Presumably the token is equivalent to the functionality performed by the chips on new cards. I assume the token has to be presented in order for the transaction to ever be approved. That should prevent it for ever being used for another transaction. If so, how is intercepting this token actually a vulnerability of it's already used at the time it's transmitted and would be intercep
Re: Simple question (Score:1)
According to the article:
"Mendoza outlined a number of attacks targeting this. In one scenario, a wrist-mounted device is used to skim tokens generated by the user's smartphone. This would require a user to authenticate â" but not complete â" a mobile payment, with Mendoza suggesting that a hacker might trick the user by asking to see a demonstration of Samsung Pay."
Re: Poor security model (Score:1)