Major Security Loophole in Mobile Payment Systems Discovered by Department of Information Engineering

Date: 
2017-09-28
Thumbnail: 
Body: 

The System Security Lab, led by Prof. Kehuan ZHANG from the Department of Information Engineering has analyzed various major mobile payment systems for their security vulnerabilities, and discovered a major loophole. The finding has caused a large third party payment platform in mainland China to promptly implement new security measures to prevent fraud. The result of the study has also been released at USENIX Security ’17, a prestigious annual academic conference on internet security, held last month in Vancouver. 

The rapid advancement of financial technology has brought forth the idea of a ‘cashless society’.  While a multitude of mobile payment systems are being deployed around the world, concerns over security issues are also on the rise. In mobile payment transactions, the key to communications between the mobile payer and payee is a payment token that is issued by the payment service provider to verify the payment. Currently, the four most widely adopted forms of transmitting these tokens are: Near-Field Communication (NFC), Quick Response Code (QR code) scans, Magnetic Secure Transmission (MST), and audio signals. According to Prof. ZHANG, whose team has spent two years conducting an in-depth study into these payment systems, apart from NFC, the remaining three formats support one-way communications only. In other words, if the transaction fails, the payee’s device is unable to notify the payer and cancel or reclaim the token already issued – a loophole an active adversary can exploit. 

Of the three vulnerable formats of token verification, QR Code scanning is the most popular. The study has revealed that a malicious device is able to sniff the token from the payee’s screen from afar and spend it on a different transaction. Because of the one-way nature of this form of communication, the payer is unaware of the transaction failure and, subsequently, suffers financial loss. Upon the discovery, the research team notified the relevant third party payment platform, which has taken prompt action to shut down their QR Code online transaction function, while keeping the QR Code offline payment function active. With offline payment functions, payers do not have to flash their tokens as frequently, reducing the possibility of fraud. This major discovery has thereby protected a large number of mobile payment system users and helped guard their e-wallets.

Regarding the MST function uniquely used by Samsung Pay, payers are required to place their handsets within a 7.5cm distance of the payees’ POS (Point of sale) for identification. But after a series of tests, the team discovered that the magnetic signals can be picked up from 2 meters away. A rogue in a supermarket queue can seize the opportunity to attack and steal the token. Audio signal tokens most commonly deployed in automated vending machines also suffer from a similar loophole. As the payers’ handsets send the tokens to the vending machines via audio signals, an adversary can easily sniff the token and inflict losses on the payers. 

Though the team has already notified the relevant third party payment platforms, Prof. ZHANG is keen to remind mobile payment users to stay alert and avoid downloading mobile apps from unknown sources. Once a malicious application is downloaded, it can gain control of the front camera, capture the reflections of QR Codes from scanners during transactions, send them to colluders, and silently incur losses on the payers’ part. 

Prof. ZHANG and his team have presented the findings in a paper titled Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment at the USENIX Security ’17, a prestigious academic conference on internet security. An annual gathering of topnotch experts, academics, researchers, law enforcers and policy makers from around the world, the conference is where the latest research on internet security is released, and is widely respected by academia and the industry. 

In the past three years, the System Security Lab at CUHK has released six highly regarded papers at various top internet security conferences. It is leading Hong Kong and the world in system security research.

Demos: https://sites.google.com/site/stlsinmobilepayment/home

 

 

 

Filter: Dept: 
Faculty
IE
Media Release

港中大揭移動支付漏洞 用戶易被盜取

流動支付方式近年愈趨流行,部分支付方式暗藏保安漏洞,成為香港移動支付進一步拓展的障礙。香港中文大學工程學院研究發現內地流行常用的二維碼掃描(QR code)、磁條讀卡器驗證存在明顯的安保漏洞,容易被不法分子盜取交易授權,招致損失。
Date: 
Thursday, September 28, 2017
Media: 
Wen Wei Po

中大揭手機畀錢藏被盜漏洞 支付寶三星中招

流動支付方式近年愈趨流行,但部分支付方式暗藏保安漏洞。中文大學工程學院研究發現內地流行常用的二維碼掃描(QR code)、磁條讀卡器驗證和聲波轉化都出現交易上的問題,容易被不法分子盜取交易授權,從而招致損失。
Date: 
Thursday, September 28, 2017
Media: 
on.cc

中大揭手機支付漏洞 超市QR碼付款1分鐘偷錢

不少港人愛以手機「埋單」,但原來暗藏保安漏洞,隨時「俾錢」變「送錢俾賊仔」。有研究發現三款較常見手機支付方式,包括近場通訊(NFC)、二維碼(QR Code)、磁條讀卡器驗證(MST),不法分子可在用戶支付短時間內,透過惡意裝置竊取支付令牌(payment code),將之用於另一項交易,用戶無法收到交易失敗的信號,不知不覺蒙受損失。
Date: 
Thursday, September 28, 2017
Media: 
Sing Tao Daily

流動支付系統揭有保安漏洞 支付寶Samsung Pay易被盜款

市民使用流動電子支付日趨盛行,但中大研究發現包括內地極為流行的「支付寶」以至三星使用的「Samsung Pay」等流動支付系統都存在潛在安全問題。尤其是支付寶使用二維條碼(QR Code)要靠用手機鏡頭進行掃描,不法份子能用黑客程式入侵手機的前置鏡頭,偷取拍攝掃瞄器所顯示的QR Code倒影,不法份子就能利用該QR Code進行未經授權的交易。
Date: 
Thursday, September 28, 2017
Media: 
Apple Daily

中大發現多種流動支付系統存保安漏動

流動支付系統雖然方便日常生活,但安全風險卻不容忽視。中文大學工程學院研究團隊發現,4種本港常用的流動支付途徑中,除了近場通訊(NFC)外,其他的支付途徑如二維碼(QR Code)掃描、磁條讀卡器驗證(MST)和聲波轉化都存在保安漏動。
Date: 
Thursday, September 28, 2017
Media: 
Hong Kong Economic Journal

中大工程學院發現流動支付系統保安漏洞多

內地近年推行包括「支付寶」及「微信支付」等流動支付系統,迅速解決包括:偽鈔、零錢不足及缺乏大鈔等治安及金融問題,但在方便之餘,亦令人擔心系統的安全問題,不少內地人都以只存放有限金錢的銀行戶口來與流動支付系統連結,以減低一旦出事時招致的金錢損失,而系統的安全性也是香港這麼現代化金融城市遲遲未能流通的原因之一。

Date: 
Thursday, September 28, 2017
Media: 
Litenews HK

中大研究:多個流動支付系統存安全漏洞

中大信息工程學系研究指出,市面上的流動支付工具都需要一組隨機密碼作為手機及商戶的溝通工具,不過除了NFC近場通訊外,其他通訊方式包括二維碼QR CODE、三星專屬磁條讀卡器驗證及聲波轉化通訊都是單向式傳輸。換言之,一旦交易失敗,商戶無法通知手機交易已被取消,有機會被盜用隨機密碼而令用戶招致損失。

Date: 
Thursday, September 28, 2017
Media: 
Now.com

中大發現流動支付系統的保安漏洞

中文大學工程學院發現主流流動支付系統的保安漏洞。針對現時流動支付兩種較常用的身份驗證方法,二維碼(QR Code)及掃磁條讀卡器,研究團隊發現,不法分子可以用惡意程式控制手機前置鏡頭,在用戶進行交易時盜取付款人的二維碼(QR Code),以進行未被授權的交易。

Date: 
Thursday, September 28, 2017
Media: 
商業電台

中大揭流動支付系統現保安漏洞 QR Code、三星MST也中招

手機流動支付系統日趨普及,但當中的保安漏動亦惹人關注。中大發現QR Code、三星電話專用的MST現保安漏洞,不法份子可藉此複製及盜取作交易身分認證的「支付令牌」(Payment Token),令消費者蒙受金錢損失。
Date: 
Thursday, September 28, 2017
Media: 
HK01

Pages