10 February 2016

Researchers hack mPOS devices, play Flappy Bird

07 April 2014  |  16282 views  |  2 izettle chipandpin

Mobile point-of-sale (mPOS) devices can be easily hacked, leaving banks, retailers and customers open to fraud, claims MWR InfoSecurity, which has even managed to play Flappy Bird on one reader.

Led by names such as Square, PayPal and iZettle, the mPOS market has mushroomed over the last couple of years, bringing card payments to small- and medium-sized businesses.

Outside of the US, manufacturers have built chip and PIN readers which have been certified as secure by the major card firms.

However, researchers at MWR Labs say that crooks can easily gain control over terminals, display 'try again' messages, switch to insecure mode and capture PINs.

The company's head of research says: "What we have found reveals that criminals can compromise the mPOS payment terminal and get full control over it. This would allow an attacker to gather PIN and credit card data, and event change the software on the device so that it accepts illegitimate payments."

Reporting their findings at the SyScan security conference in Singapore, the team showed that they were even able to use an iZettle-branded card reader built by Miura Systems - which provides devices to PayPal, Payleven and Worldpay, among others - to play a simplified version of the popular game Flappy Bird:

Chippy Pin from Nils on Vimeo.

MWR is refusing to provide any details on how it hacked the readers but says that it has notified the vendors involved.

In a statement, device maker Miura says: "It has come to our attention that at the Syscan '14 Conference currently being held in Singapore certain vulnerabilities were identified in a number of mPOS PIN entry solutions, from a variety of manufacturers.

"An mPOS PIN entry solution designed by Miura Systems Limited was mentioned as having potential vulnerabilities, despite there being no evidence or indication that any loss has been suffered from any historical attack on these perceived weaknesses.

"Miura continues to maintain and invest in providing advances in preventing fraudulent activity and its solutions are independently tested by PCI (Payment Card Industry) against whose standards all Miura solutions are validated. As such, Miura's mPOS PIN entry solutions remain fully compliant with PCI PTS 3.0 & are UKCC Certified."

Comments: (2)

David Pipe - Powa Technologies - London | 07 April, 2014, 15:31

There's an app for that:  


Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Niraj Singh - ICIC Bank Ltd - Mumbai | 08 April, 2014, 03:56

MWR should publish the result in detail for benefit of Merchants and banks.

Be the first to give this comment the thumbs up 0 thumb ups! (Log in to thumb up)
Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Finextra news in your inbox

For Finextra's free daily newsletter, breaking news flashes and weekly jobs board, sign up now.

Related blogs

Create a blog about this story (membership required)

Related stories

20 March, 2014
25 February, 2014
18 February, 2014
18 October, 2013
01 October, 2013
27 June, 2013
05 June, 2013
14 May, 2013
22 February, 2013
20 February, 2013
30 July, 2012

Related company news


Top payments topics

Most viewed Most shared
Visa opens up to developers
9024 views comments | 24 tweets | 41 linkedin
European mobile banking service Pocopay go...
7587 views comments | 24 tweets | 14 linkedin
Wearable payments startup Fit Pay secures...
6215 views comments | 26 tweets | 9 linkedin
Security experts warn of new breed of bank...
4965 views comments | 8 tweets | 19 linkedin
Turkish ACH BKM launches FinTech Istanbul
4782 views comments | 16 tweets | 9 linkedin

Featured job

to $120K base, double OTE, benefits
New York City, NY or Boston, MA (USA)

Find your next job