Home > Cyber News > Mobile PoS Vulnerabilities Impact Paypal, Square, SumUp
CYBER NEWS

Mobile PoS Vulnerabilities Impact Paypal, Square, SumUp

An alarming discovery was recently made during the Black Hat conference held in Las Vegas. Security researchers from Positive Technologies reported that vulnerabilities in mPOS (mobile Point-of-Sale) machines allow attackers to take over customer accounts and steal credit card data. Affected vendors include Square, SumUp, iZettle, and PayPal.




As reported by researchers Leigh-Anne Galloway and Tim Yunusov, attackers could alter the amount charged to a credit card. They are also capable of other misdeeds such as forcing customers to use other payment methods, like magstripe. The latter can be compromised more easily than chips for the purpose of data exfiltration, researchers explain.

Mobile PoS Vulnerabilities Allow Attackers to Tamper with Values, Transactions

The research team uncovered a number of flaws in endpoint payment systems some of which could lead to MiTM attacks. Other attack vectors built on the exploit of these flaws include the transfer of arbitrary code via Bluetooth and mobile apps, as well as tampering with magstripe transactions.

All of these attacks are possible due to the way mPoS systems function – via Bluetooth to connect to mobile apps and then send the data to payment provider servers. By intercepting these communications it becomes possible to manipulate values and obtain access to transaction traffic.

On top of this, attackers can remotely execute code on compromised hosts and gain full access to the operating systems of card readers. The list of malicious activities based on these vulnerabilities is rather long. Attackers can also alter purchases, change their values or make some transactions look like they have been declined.

Related Story: Prilex PoS Malware Has Everything Cybercrooks Need

One of the researchers, Leigh-Anne Galloway, explained that:

Currently there are very few checks on merchants before they can start using a mPOS device and less scrupulous individuals can, therefore, essentially, steal money from people with relative ease if they have the technical know-how. As such, providers of readers need to make sure security is very high and is built into the development process from the very beginning.

In addition to the mPoS vulnerabilities, the researchers also reported two other vulnerabilities, identified as CVE-2017-17668 and CVE-2018-5717, that impact ATMs manufactured by NCR.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree