Page 109 - Cyber Warnings August 2017
P. 109

magnetic stripe code tricks the terminal into believing the card really does not have a chip.
               Within the code located in the magnetic stripe is an area that indicates the card has the chip.
               Usually, when the card is read, the stripe, if used, indicates there should be a chip and directs
               the user to place the chip end of the card into the reader. In this case, the attack toggles the
               code so this indicates there should not be a chip. The credit card is then accepted when it
               should not be.

               Although this is curious in its own right, this issue continued with the issuing bank. The
               communication from the terminal is the card does not and should not have the chip, while the
               issuing bank’s system shows it should. The bank, although it appears to be a significant error,
               the bank’s system may still over-rule the issue.

               In the alternative, the attackers could have directly attacked the chip. Although this would be a
               great scene in Mr. Robot, this attack would have taken much more time for the attacker to work
               on. Based on the chip and encryption, this may not be crack-able in several lifetimes.

               Remediation

               This was such or significant issue, even the FBI took notice and became involved. The FBI
               Internet Crime Complaint Center publicly warned of the attack was viable. One aspect of
               security to apply to the situation would be end-to-end encryption. This service is not free, but
               would act as an added service. Although not free, this would provide savings in that potential
               fraud would decrease. With the potential fraud, measuring this could be an issue, as there is not
               an actual number compare against. One measure could be the baseline amount adjusted for
               inflation. With whichever method chosen, this would be the better alternative as compared to the
               opportunity for the fraud to continue and grow.

               Resources

               Aol.com Editors. (2016, August 4). Researchers find security flaw with chip-based credit cards.
               Retrieved from http://www.aol.com/article/2016/08/04/researchers-find-security-flaw-with-chip-
               based-credit-cards/21444927/

               Bond, M., Choudary, O. Murdocy, S.J., Skorobogatov, S., & Anderson, R. (2014, May). IEEE
               Symposium on Security and Privacy; San Jose, CA. Retrieved from
               http://sec.CS.uclac.uk/users/smurdoch/papers/oakland14chipandskim.pdf

               Brandon, R. (2015, October 9). The FBI warns of weaknesses in chip-and-sign credit card
               systems. Retrieved from http://www.theverge.com/2016/10/0/9486715/fbi-vulnerability-chip-
               credit-card

               CNN Wire. (2016, August 3). Researchers find new security flaw in chip-based credit cards.
               Retrieved from http://wtvv.com/2016/08/03/researchers-find-new-security-flaw-in-chip-based-
               credit-cards/


               Eddy, M. (n.d.). Black hat demo cracks chip-n-PIN. Retrieved from
               http://www.pcmag.com/news/346753/black-hat-demo-cracks-chip-and-pin



                  109    Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   104   105   106   107   108   109   110   111   112   113   114