Just in:
New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // Oman Seeks Growth Through Strategic Economic Alliances // Leading with Compliance, ZUHYX Earns the Canadian MSB License // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // Election Commission Has A Dismal Record On Acting Against Modi’s Breaches Of Poll Code // ZUHYX Exchange: Embracing Social Responsibility for a Sustainable Future // UAE Scrutinizes Report on Racial Discrimination Treaty // Ministry of Agriculture Supports Taiwanese Tea’s Entry into Singapore Market to Boost Global Presence // Quality HealthCare Partners with eHealth to Enhance Patient Treatment Efficiency // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // UAE President, Spanish Prime Minister Hold Phone Talks // Cobb’s Game-Changer: Introducing One-Stop Event Transport Management Solution // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // Abu Dhabi Secures US$5 Billion in Fresh Funding // Central Bank of Nigeria Debunks Rumors of Crypto Account Freeze // Hong Kong Unveils April 30 Launch for Landmark Crypto ETFs // AVPN Charts Path Forward at 2024 Global Conference // Sharjah Census Gears Up for Final Enumeration Phase //

Samsung Pay Might Be Ripe for Hack

The newest smartphones in Samsung’s Galaxy line come with contactless mobile payment capability. That’s good news when it comes to convenience, but it might be bad news when it comes to security.

During a presentation given recently at the Def Con security conference in Las Vegas, a computer science student demonstrated a variety of attacks against Samsung Pay, Samsung’s mobile payment service.

The attacks Mendoza described were able to intercept or fabricate payment tokens, which are the single-use codes created by users’ smartphones that they can use to pay via credit card accounts without using card information. The tokens are sent from the users’ devices to payment terminals during wireless purchases, and expire 24 hours after they’re issued.

ADVERTISEMENT

One Scenario

During the demonstration, Mendoza used a wrist-mounted device to skim tokens generated by another user’s smartphone. “If a Samsung customer tries to use Samsung Pay but something happens in the middle of the transaction . . . that token [is] still alive,” said Mendoza. “An attacker could jam the transaction process to make Samsung Pay failed [sic] and force it to generate the next token.”

In his presentation, Mendoza also said that he has uncovered patterns in Samsung’s method of token generation that, at least in theory, could let a hacker make his own valid tokens via educated guesses. He didn’t say whether or not he’s been able to do this himself.

Extremely Difficult

Samsung took issue with that allegation in a post on its security blog. “Samsung Pay does not use the algorithm claimed in the Black Hat presentation to encrypt payment credentials,” according to the company’s mobile security staff.

What makes a scenario such as the one described by Mendoza implausible is that the attacker must be physically close to the smartphone user who is in the process of making a purchase, according to Samsung.

Additionally, such a scam would require split-second timing — waiting for someone to buy something, intercepting the signal between the smartphone and the payment terminal, grabbing the token from the user’s phone, and then using it before the user can. Samsung called that process “extremely difficult.”

However, in a FAQ page linked to the blog post, Samsung acknowledged that there are scenarios in which someone could skim a user’s payment token and make a fraudulent purchase with that person’s card. Samsung and the payment firms it works with classify those sorts of scenarios as acceptable risks for mobile payment users. That method of payment is no more hazardous than using a credit card, according to the company.

Let’s block ads! (Why?)

ADVERTISEMENT

ADVERTISEMENT