24 July 2014

Researchers hack mPOS devices, play Flappy Bird

07 April 2014  |  11190 views  |  2 izettle chipandpin

Mobile point-of-sale (mPOS) devices can be easily hacked, leaving banks, retailers and customers open to fraud, claims MWR InfoSecurity, which has even managed to play Flappy Bird on one reader.

Led by names such as Square, PayPal and iZettle, the mPOS market has mushroomed over the last couple of years, bringing card payments to small- and medium-sized businesses.

Outside of the US, manufacturers have built chip and PIN readers which have been certified as secure by the major card firms.

However, researchers at MWR Labs say that crooks can easily gain control over terminals, display 'try again' messages, switch to insecure mode and capture PINs.

The company's head of research says: "What we have found reveals that criminals can compromise the mPOS payment terminal and get full control over it. This would allow an attacker to gather PIN and credit card data, and event change the software on the device so that it accepts illegitimate payments."

Reporting their findings at the SyScan security conference in Singapore, the team showed that they were even able to use an iZettle-branded card reader built by Miura Systems - which provides devices to PayPal, Payleven and Worldpay, among others - to play a simplified version of the popular game Flappy Bird:

Chippy Pin from Nils on Vimeo.


MWR is refusing to provide any details on how it hacked the readers but says that it has notified the vendors involved.

In a statement, device maker Miura says: "It has come to our attention that at the Syscan '14 Conference currently being held in Singapore certain vulnerabilities were identified in a number of mPOS PIN entry solutions, from a variety of manufacturers.

"An mPOS PIN entry solution designed by Miura Systems Limited was mentioned as having potential vulnerabilities, despite there being no evidence or indication that any loss has been suffered from any historical attack on these perceived weaknesses.

"Miura continues to maintain and invest in providing advances in preventing fraudulent activity and its solutions are independently tested by PCI (Payment Card Industry) against whose standards all Miura solutions are validated. As such, Miura's mPOS PIN entry solutions remain fully compliant with PCI PTS 3.0 & are UKCC Certified."
KeywordsEFTPOS

Comments: (2)

David Pipe - ZNAP - London | 07 April, 2014, 15:31

There's an app for that:  

http://tinyurl.com/k6st67s


Niraj Singh - ICIC Bank Ltd - Mumbai | 08 April, 2014, 03:56

MWR should publish the result in detail for benefit of Merchants and banks.

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Related blogs

Create a blog about this story (membership required)

Related stories

20 March, 2014
25 February, 2014
18 February, 2014
18 October, 2013
01 October, 2013
27 June, 2013
05 June, 2013
14 May, 2013
22 February, 2013
20 February, 2013
30 July, 2012

Related company news

 

Featured job

Basic £130-140K Variable £70-90K
London (preferred) or Paris

Find your next job