Qwick Codes and Card-less ATMs

I just read that a vast network of ATMs will soon allow transactions without a card (PDF).

Payment Alliance International (PAI), a leader in electronic payment processing solutions, and MagTek, a global leader in secure mobile payments technology, jointly announce the deployment of MagTek’s Qwick Codes across PAI’s nationwide network of over 50,000 ATM machines.

…solution that consumers can use everywhere without actually carrying a payment card.

First question: if ATM stands for automated teller machine then what is an ATM machine? I’m not trying to be picky; I just figure a press release from the leader in electronic payment processing with 50,0000 units might be on to something new and pushing the envelope (pun not intended).

But seriously, I think I should not call this a card-less system. It is an ATM without the need to swipe the card; the transactions still need a card. The need to carry the card is related to a card carrier’s ability to plan ahead and generate tokens. With the new system data is transferred from a card to a phone so the card does not need to be swiped at the ATM machine (or ATM).

Qwick Codes Mobile Wallet is an easy-to-use application that runs on a PC, Apple iOS device or Android smartphone with a Secure Card Reader Authenticator peripheral attached. All consumers need to do to generate a unique Qwick Code is swipe any traditional magnetic stripe payment card they already carry in their wallets through the Authenticator and a one-time, disposable account number and PIN are generated. Consumers use their Qwick Code and PIN at supported ATMs to withdraw cash, eliminating the need to physically carry a payment card while reducing exposure from skimming and related fraud.

The goal is to avoid skimming attacks at the ATM. I have written about that security issue before. In this case I have my doubts about the security of the link between the application on the computer and the Secure Card Reader Authenticator. I also notice that they claim support for a PC and Apple iOS. Who wants to bet that they mean Microsoft Windows OS when they say PC? Not a good sign.

Web Pentest Practice List

From Felipe Martins

Note that this post intends to show only vulnerable applications used to be exploited, not the tools used to exploit them.

Interesting that the goal is to setup an environment that is vulnerable in order to test out the web penetration tools. I guess I have become so used to things being the other way around (setting up attack tools to test vulnerabilities of an environment) that this seems like a novel idea to me.

Facebook Security Leak Since 2007

Two security researchers have documented a serious and long-standing design flaw in Facebook:

Third parties, in particular advertisers, have accidentally had access to Facebook users’ accounts including profiles, photographs, chat, and also had the ability to post messages and mine personal information.

[…]

There is no good way to estimate how many access tokens have already been leaked since the release Facebook applications back in 2007. We fear a lot of these tokens might still be available in log files of third-party servers or still being actively used by advertisers. Concerned Facebook users can change their Facebook passwords to invalidate leaked access tokens. Changing the password invalidates these tokens and is equivalent to “changing the lock” on your Facebook profile.

I’ll let you guess why “there is no good way to estimate” unauthorised access at Facebook.

Crafty 20 State PIN Pad Attack

Michaels Stores, with over 1,000 locations, calls itself North America’s “largest speciality retailer”. Their website, which shows the slogan “Where Creativity Happens”, has just posted three Consumer Notices on PIN Pad tampering at their stores. Their CEO John Menzer joined in 2009 (after twelve years at WalMart) and today issued a statement:

We are confident Michaels stores are a safe place to shop.

The Chicago Tribune offers this perspective on the PIN Entry Device (PED) breach.

The crafts-store chain identified 90 keypads in 80 stores that were compromised in Colorado, Delaware, Georgia, Iowa, Massachusetts, Maryland, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, Ohio, Oregon, Pennsylvania, Rhode Island, Utah, Virginia and Washington.

Michaels has removed the suspicious swipe pads and over the next two weeks plans to replace about 7,200 similar PIN keypads from its stores. Until those pads are replaced with upgraded models, the company said customers must use cash, credit cards or signature-based debit cards.

Moving to signature-based cards is a reasonable response. A survey by First Data Corporation in 2008 said only 22% prefer PIN debit while 17% prefer signature, so removing PIN probably is not disruptive to the consumer. It also is not any more secure. A signature can obviously be forged more easily than a PIN can be stolen.

Although I see some speculation about how hard it is for attackers to have coordinated an attack on 90 keypads in 80 stores (about 1%) I can’t help but compare it to the store’s plan to deploy over 7,000 keypads in just two weeks. It may be a great effort and expense, or it could beg the question of supply chain security as well as ease of replacement — where does authorisation fit in? How hard is it really, to swap the keypads?

The big clue to the story is in the Tribune phrase “replaced with upgraded models”.

There is a chance that Michaels was using old PED that the Payment Card Industry (PCI) wanted replaced anyway. Visa explains the risk in their Compromised PIN Entry Device Listing.

Although some of the recently identified devices are newer devices, many are over 10 years old and were never evaluated by an independent lab or approved by Visa or the Payment Card Industry (PCI).

[…]

Evidence indicates that these devices were physically removed from their locations and replaced with modified devices designed to skim account and PIN data. Surveillance footage shows that the suspects in most cases were able to remove and install a POS PED in less than one minute.

Thus, it’s not hard to imagine an attack on 90 devices even at 80 stores.

To prevent this attack PED are meant to be authenticated and verified regularly with three levels of security — technical, physical, and administrative. With that in mind, there are basically three PED security types in the industry:

  1. Non-Approved Devices (Pre 2004)
  2. VISA PED Approved Devices (2003 – 2006)
  3. PCI PED Approved Devices (2006 onwards)

If all the keypads at Michaels were of the 3rd category, a technical review and the upgrade will be most interesting. Anything from the 1st category will be a “we-warned-you” moment for Visa and the PCI.

July 1, 2010 was supposed to be the last date that pre-Visa PED Approved devices were allowed. Visa originally threatened fines for violations but they caved to industry pressure and moved the enforcement deadline out two years.

Visa agreed to back off its earlier PIN pad compliance deadline originally set for July 1, 2010, to the new date of Aug. 1, 2012. […] The changes were mostly fueled by strong retail lobbying efforts, even beyond convenience retailers — including at least one major department store. Retailers threatened to abruptly cut off PIN debit at the deadline, possibly switching to signature debit to temporarily sidestep the issue, according to the report.

Was Michaels running old PEDs? And if so did they miss the July 1, 2010 deadline due to cost concerns?

Physical review is also an essential factor in this case. Investigators will pore over audit trails related to PED service technicians, shift schedules, service logs, terminal inventory, surveillance video, etc. to see if there were physical warning signs of tampering.

Above all, Michaels customer transactions were exposed from February 8 to May 6, 2011. About 100 now have reported fraud on their accounts. The PCI PED requirements include a weekly review for tampering so (even if they had PCI-compliant technical and physical security) a three month exposure will definitely generate some tough administrative questions for Michaels.