[Vid] Hacking a Credit Card in 6 Seconds & How to Protect yourself
Hack - Hack - Hack - Hack

[Vid] Hacking a Credit Card in 6 Seconds & How to Protect yourself

As India attempts an upgrade to a cashless society, cyber security experts have raised serious concerns and revealed how to find credit card information – including expiration dates and CVV numbers – in just 6 Seconds.

And what's more interesting? The hack uses nothing more than guesswork by querying multiple e-commerce sites.

In a new research paper entitled "Does The Online Card Payment Landscape Unwittingly Facilitate Fraud?" published in the academic journal IEEE Security & Privacy, researchers from the University of Newcastle explains how online payments remain a weak spot in the credit card security which makes it easy for fraudsters to retrieve sensitive card information.

The technique, dubbed Distributed Guessing Attack, can circumvent all the security features put in place to protect online payments from fraud. The similar technique is believed to be responsible for the hack of thousands of Tesco customers in the U.K recently.

The issue relies on the Visa payment system, where an attacker can guess and attempt all possible permutations and combinations of expiration dates and CVV numbers on hundreds of websites.

Researchers discovered two weaknesses in the way online transactions are verified using the Visa payment system. They are as follows:

  1. Online payment systems do not detect multiple incorrect payment requests if they're performed across multiple sites. They also allow a maximum of 20 attempts per card on each site.
  2. Web sites do not run checks regularly, varying the card information requested.

Newcastle University PhD candidate Mohammed Ali says neither weakness is alone too severe, but when used together and exploited properly, a cyber criminal can recover a credit card's security information in just 6 seconds, presenting "a serious risk to the whole payment system."

Here's how the attack works:


The attack is nothing but a very clever brute force attack that works against some of the most popular e-commerce sites.

So, instead of brute-forcing just one retailer's website that could trigger a fraud detection system due to incorrect guesses or lock the card, the researchers spread out guesses for the card's CVC number across multiple sites with each attempt narrowing the possible combinations until a valid expiration dates and CVV numbers are determined.

The video demonstration shows that it only takes 6 seconds for a specially designed tool to reveal a card's secure code.

First, an attacker needs a card's 16-digit number, which can be obtained either from black-market websites for less than $1, or from a smartphone equipped with a near-field communication (NFC) reader to skim them.

Once a valid 16-digit number is obtained, the hacker use web bots to brute force three-digit card verification value (or CVV) and expiration date to hundreds of retailers at once. The CVV takes a maximum of 1,000 guesses to crack it and the expiry date takes no more than 60 attempts.


The bots then work to obtain the billing address, if required. The paper suggests the whole attack can be carried out in just 6 seconds.

"These experiments have also shown that it is possible to run multiple bots at the same time on hundreds of payment sites without triggering any alarms in the payment system," researchers explain in the paper.
"Combining that knowledge with the fact that an online payment request typically gets authorized within two seconds makes the attack viable and scalable in real time. As an illustration, with the website bot configured cleverly to run on 30 sites, an attacker can obtain the correct information within four seconds."

The attack works against Visa card customers, as the company does not detect multiple attempts to use a card across its network, while MasterCard detects the brute force attack after fewer than 10 attempts, even when the guesses are spread across multiple websites.

How to Protect yourself?

The team investigated the Alexa top-400 online merchants’ payment websites and found that the current payment platform facilitates the distributed guessing attack.

The researchers contacted the 36 biggest websites against which they ran their distributed card number-guessing attack and notified them of their findings. As a result of the disclosure, eight sites have already changed their security systems to thwart the attacks.

However, the other 28 websites made no changes despite the disclosure.

For Visa, the best way to thwart the distributed card number-guessing attack is to adopt a similar approach to MasterCard and lock a card when someone tries to guess card details multiple times, even tried across multiple websites.

For customers, avoid using Visa credit or debit cards for making online payments, always keep an eye on your statements, and keep spending limit on your Visa card as low as possible.

Source

Leigh Hatfull

Procurement SME / Operations / PMO

7 年

Hi David, nice article. Many people use the likes of PayPal linked to a credit card. What effect would that have, in this scenario?

Following the payment space, this "trick" relies on an archaic CVV only authentication e.g. used by PayPal and a few limited non-3D-Secure payment processors. Most of the e-commerce world has moved on to the mature 3D Secure. A PAN or NFC copied number itself will not process online, not even with known CVV. The point however is valid: security is only as strong as the weakest link.

Dr Magda Chelly

Cybersecurity & Risk Management | AI-Powered Regulatory Compliance | SG 100 Women in Tech | Published Author & TEDx Speaker | Featured in Forbes ???? | Advocate for Responsible Cyber | Techstars 2024

7 年

David, I really enjoy reading your articles and they are always great updates and cyber security views. I find this one really handful, for security experts as it leads the thoughts on other different directions and possible attacks not only on these payment gateways.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了