massive data theft at MasterCard processor

Anne & Lynn Wheeler lynn at garlic.com
Tue Jun 21 08:27:59 EDT 2005


Peter Fairbrother wrote:
> Also there are several attacks on Chip n' PIN as deployed here in the UK,
> starting with the fake reader attacks - for instance, a fake reader says you
> are authorising a payment for $6.99 while in fact the card and PIN are being
> used to authorise a transaction for $10,000 across the street. They get
> quite complex, there's the double-dip, where the $6.99 transaction is also
> made, and the delayed double dip, where a reader belonging to a crook makes
> the $10,000 transaction several days later (the crook has to skip town with
> the money in this attack - so far. Except of course he never existed in the
> first place, and maybe ...).

the payment infrastructure requires a financial institution taking
responsibility for a merchant to connect into the network ... and the
settlement into the merchant account nominally flows thru the sponsoring
merchant financial institution. for a merchant not to actually exist
would require some lapse on the sponsoring financial institution ...
i.e. some of the anonomous stored-value specifications tried to simulate
direct cash-like transfer between two tokens .... but the existing
payment networks are far from that, requiring a bit more deception
on the part of any fraudulent merchant.

note that some of the transaction authentication specifications don't
necessarily match x9.59 financial standard in also specifying that a PAN
in an authenticated transaction can't be used in a non-authenticated
transaction. recent post reference
http://www.garlic.com/~lynn/aadsm19.htm#38
http://www.garlic.com/~lynn/2005k.html#55
http://www.garlic.com/~lynn/2005k.html#56

i.e. which still leaves open the various harvesting vulnerabilities. the
x9.59 financial standard specified that both

1) transactions have to be individually authenticated (account-level
authentication with the issuing institution) and

2) the same PAN used in authenticated transactions can't be used in
non-authenticated transactions (countermeasure to harvesting
vulnerability where crook could utilize information for later fraudulent
transactions)

misc. x9.59
http://www.garlic.com/~lynn/index.html#x959
http://www.garlic.com/~lynn/subpubkey.html#privacy

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list