Researchers hack mPOS devices, play Flappy Bird

Mobile point-of-sale (mPOS) devices can be easily hacked, leaving banks, retailers and customers open to fraud, claims MWR InfoSecurity, which has even managed to play Flappy Bird on one reader.

  18 2 comments

Researchers hack mPOS devices, play Flappy Bird

Editorial

This content has been selected, created and edited by the Finextra editorial team based upon its relevance and interest to our community.

Led by names such as Square, PayPal and iZettle, the mPOS market has mushroomed over the last couple of years, bringing card payments to small- and medium-sized businesses.

Outside of the US, manufacturers have built chip and PIN readers which have been certified as secure by the major card firms.

However, researchers at MWR Labs say that crooks can easily gain control over terminals, display 'try again' messages, switch to insecure mode and capture PINs.

The company's head of research says: "What we have found reveals that criminals can compromise the mPOS payment terminal and get full control over it. This would allow an attacker to gather PIN and credit card data, and event change the software on the device so that it accepts illegitimate payments."

Reporting their findings at the SyScan security conference in Singapore, the team showed that they were even able to use an iZettle-branded card reader built by Miura Systems - which provides devices to PayPal, Payleven and Worldpay, among others - to play a simplified version of the popular game Flappy Bird:

Chippy Pin from Nils on Vimeo.


MWR is refusing to provide any details on how it hacked the readers but says that it has notified the vendors involved.

In a statement, device maker Miura says: "It has come to our attention that at the Syscan '14 Conference currently being held in Singapore certain vulnerabilities were identified in a number of mPOS PIN entry solutions, from a variety of manufacturers.

"An mPOS PIN entry solution designed by Miura Systems Limited was mentioned as having potential vulnerabilities, despite there being no evidence or indication that any loss has been suffered from any historical attack on these perceived weaknesses.

"Miura continues to maintain and invest in providing advances in preventing fraudulent activity and its solutions are independently tested by PCI (Payment Card Industry) against whose standards all Miura solutions are validated. As such, Miura's mPOS PIN entry solutions remain fully compliant with PCI PTS 3.0 & are UKCC Certified."
Sponsored [Webinar] 2025 Fraud Trends: Synthetic Identity, AI and Incoming Mandates

Comments: (2)

A Finextra member 

There's an app for that:  

http://tinyurl.com/k6st67s


A Finextra member 

MWR should publish the result in detail for benefit of Merchants and banks.

New Report – The Future of AI in Financial Services 2025Finextra PromotedNew Report – The Future of AI in Financial Services 2025