{"id":16744,"date":"2014-11-05T10:47:35","date_gmt":"2014-11-05T10:47:35","guid":{"rendered":"http:\/\/www.flubu.com\/blog\/?p=16744"},"modified":"2014-11-05T10:47:35","modified_gmt":"2014-11-05T10:47:35","slug":"well-thats-a-big-oopsie","status":"publish","type":"post","link":"https:\/\/www.flubu.com\/blog\/2014\/11\/05\/well-thats-a-big-oopsie\/","title":{"rendered":"Well, that&#8217;s a big oopsie!"},"content":{"rendered":"<p><center><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"16745\" data-permalink=\"https:\/\/www.flubu.com\/blog\/2014\/11\/05\/well-thats-a-big-oopsie\/mos2-template-master\/\" data-orig-file=\"https:\/\/www.flubu.com\/blog\/wp-content\/uploads\/2014\/11\/nfc-fraud.jpg\" data-orig-size=\"500,215\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;Henry Nolan&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;MoS2 Template Master&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"MoS2 Template Master\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/www.flubu.com\/blog\/wp-content\/uploads\/2014\/11\/nfc-fraud.jpg\" src=\"https:\/\/www.flubu.com\/blog\/wp-content\/uploads\/2014\/11\/nfc-fraud.jpg\" alt=\"MoS2 Template Master\" width=\"500\" height=\"215\" class=\"alignnone size-full wp-image-16745\" srcset=\"https:\/\/www.flubu.com\/blog\/wp-content\/uploads\/2014\/11\/nfc-fraud.jpg 500w, https:\/\/www.flubu.com\/blog\/wp-content\/uploads\/2014\/11\/nfc-fraud-400x172.jpg 400w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/center><\/p>\n<p>According to researchers at Newcastle University in the UK, the card system developed by VISA for use in the United Kingdom fails to recognize transactions made in non-UK foreign currencies and can therefore be tricked into approving any transaction up to 999,999.99.<\/p>\n<p>What\u2019s more, because the cards allow for contactless transactions, wherein consumers need only to have the card in the vicinity of a reader without swiping it, a thief carrying a card reader designed to read a card that\u2019s stored in a wallet or purse could conduct fraudulent transactions without the victim ever removing their card.<\/p>\n<p>Since the transaction is done offline without going through a retailer\u2019s point-of-sale system, no other security checks are done.<\/p>\n<blockquote><p>\u201cWith just a mobile phone we created a POS terminal that could read a card through a wallet,\u201d Martin Emms, lead researcher of the project that uncovered the flaw, noted in a statement about the findings. \u201cAll the checks are carried out on the card rather than the terminal so at the point of transaction, there is nothing to raise suspicions. By pre-setting the amount you want to transfer, you can bump your mobile against someone\u2019s pocket or swipe your phone over a wallet left on a table and approve a transaction.\u201d<\/p><\/blockquote>\n<p>In tests the researchers conducted, transactions took less than a second to be approved. In the UK, contactless payments are limited to a maximum value of \u00a320, requiring a PIN for anything more than this. But the researchers found that the system doesn\u2019t recognize foreign currency transactions and therefore doesn\u2019t require a PIN for these.<\/p>\n<blockquote><p>\u201cThis lends itself to multiple attackers across the world collecting small transactions of perhaps \u20ac200 at a time for a central rogue merchant who could be located anywhere in the world,\u201d Emms notes. \u201cThis previously undocumented flaw around foreign currency, combined with the lack of POS terminal authentication and the ease of skimming contactless credit cards, makes the system more vulnerable to high-value attacks.<\/p>\n<p>It is not clear from reading the payment protocol how banks would deal with the inconsistencies we have found through our research, hence we believe the vulnerability poses a potential threat,\u201d he said. \u201cThe fact that we can by-pass the \u00a320 limit makes this new hack potentially very scalable and lucrative. All a criminal would need to do is set up somewhere like an airport or the London underground where the use of different currencies would appear legitimate.\u201d<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>According to researchers at Newcastle University in the UK, the card system developed by VISA for use in the United Kingdom fails to recognize transactions made in non-UK foreign currencies and can therefore be tricked into approving any transaction up to 999,999.99. What\u2019s more, because the cards allow for contactless transactions, wherein consumers need only&#8230;<\/p>\n<p class=\"more-link-wrap\"><a href=\"https:\/\/www.flubu.com\/blog\/2014\/11\/05\/well-thats-a-big-oopsie\/\" class=\"more-link\">Read More<span class=\"screen-reader-text\"> &ldquo;Well, that&#8217;s a big oopsie!&rdquo;<\/span> &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[87],"class_list":["post-16744","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-news-from-the-stupid"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p3u9vK-4m4","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/posts\/16744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/comments?post=16744"}],"version-history":[{"count":2,"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/posts\/16744\/revisions"}],"predecessor-version":[{"id":16747,"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/posts\/16744\/revisions\/16747"}],"wp:attachment":[{"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/media?parent=16744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/categories?post=16744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.flubu.com\/blog\/wp-json\/wp\/v2\/tags?post=16744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}