FB pixel

Visa vulnerability in Apple Pay allows biometrics bypass for fraudulent payments

Scientists hack own phones via Apple Pay Visa integration
Visa vulnerability in Apple Pay allows biometrics bypass for fraudulent payments
 

UK scientists found a vulnerability in the Express Transit mode for iPhones which allowed them to fool iPhones via a “replay and relay” attack into making contactless payments of £1,000 (US$1,350) on Visa cards linked to Apple Pay – while the phone is locked and without authorization. They were using only their own phones, but the process shows that limitless amounts could be taken. Coding meant the need to provide any biometric authorization was simply bypassed.

The vulnerability exists in the iPhone digital wallet’s Express Transit mode where users can make a contactless payment at a ticket barrier without needing to unlock their phones.

The team from the University of Birmingham and University of Sussex posted videos along with their findings to demonstrate the process.

According to BBC reporting, Apple has said this is “a concern with a Visa system” while Visa has said the attacks carried out were impractical outside of a lab.

According to the researchers’ findings summary, the team alerted Apple in October 2020 and Visa in May 2021. The vulnerability still exists. “Both parties acknowledge the seriousness of the vulnerability, but have not come to an agreement on which party should implement a fix.”

Despite the bedroom settings and use of Lego, the biometrics bypassing experiments reflect lab conditions. While it might be hard to hack a phone in similar fashion in a real-life setting, the stolen phone could simply be taken into a criminal lab.

For their ‘active man-in-the-middle’ attack, the team used an iPhone 7 and more recent 12 with a Visa card set up as a transit card (credit or debit). This was read by a commercially available card reader emulator (a piece of radio kit by Proxmark) which was connected to an NFC-enabled Android phone which would be a card emulator.

The Proxmark was connected by USB to a laptop, which communicated with the card emulating Android via WiFi. Bluetooth also works. An additional mobile was used to operate a merchant card terminal, in this case a standard bit of kit by iZettle.

Then the card reader emulator (Proxmark box) just needs to be held near an iPhone. The reader emulator, Android and laptop then run the relay attack, first telling the iPhone that it is being read by a transit terminal, bypassing the need for the phone to be unlocked.

The kit communicates with the straightforward merchant set-up, which then debits the Visa card by any amount. No authorization – typically biometric by Face ID or fingerprint – by the holder is required as coding also makes it appear as though permission has been given to allow the transaction. In the videos, the iPhone remains locked throughout with no notification appearing on the screen. Only by going into the Apple Pay wallet on the handset and looking at transactions for the Visa card can the owner see what has happened.

The scientists recommend people not to have a Visa card linked to Apple Pay for transit payments.

Further work by the team uncovered more vulnerabilities for Visa card payments not related to the Apple Pay hacks.

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

City of London seeks digital ID orchestrator as reusable identity push accelerates

The City of London is calling on tech companies to build a reusable digital identity verification service for the financial…

 

Jordan grants legal status to Sanad digital ID as users pass 2.6M

Jordan’s Sanad digital identity app, which operates using iris biometrics from IrisGuard, now has full legal status. A report from…

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events