A new attack called a "card brand mixup" exploits vulnerabilities in a protocol used in credit cards to deceive a point-of-sale terminal into transacting with a Mastercard posing as a Visa card, The Hacker News reports.
Researchers from ETH Zurich demonstrated how the use of an Android application to initiate a man-in-the-middle attack enables the terminal and the card to interact while also manipulating the communications between them to create a mismatch between the payment network and the card brand.
By deceiving a payment terminal into activating a flawed EMV Kernel, the actors can induce the terminal to accept a contactless transaction with the card’s primary account number and application identifier indicating different brands, allowing them to perform a Visa transaction with the terminal and a Mastercard transaction with the card, the researchers said.
The researchers submitted their findings to Mastercard, which has since introduced several countermeasures.
Jill Aitoro is senior vice president of content strategy for CyberRisk Alliance. She has more than 20 years of experience editing and reporting on technology, business and policy. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.
The Defense Department says the war in Ukraine has provided fresh insights into how cyber campaigns can play a part in large-scale conventional conflicts.
Several U.S. defense and government organizations have been targeted by state-backed Chinese hacking group Bronze Silhouette, also known as Volt Typhoon, for military intelligence over a period of at least two years, according to The Record, a news site by cybersecurity firm Recorded Future.
Russian, North Korean, and Iranian advanced persistent threat operations have been launching more attacks aimed at compromising small- and medium-sized businesses, as well as their regional managed service providers, reports SecurityWeek.