Researchers hack mPOS devices, play Flappy Bird

Researchers hack mPOS devices, play Flappy Bird

Mobile point-of-sale (mPOS) devices can be easily hacked, leaving banks, retailers and customers open to fraud, claims MWR InfoSecurity, which has even managed to play Flappy Bird on one reader.

Led by names such as Square, PayPal and iZettle, the mPOS market has mushroomed over the last couple of years, bringing card payments to small- and medium-sized businesses.

Outside of the US, manufacturers have built chip and PIN readers which have been certified as secure by the major card firms.

However, researchers at MWR Labs say that crooks can easily gain control over terminals, display 'try again' messages, switch to insecure mode and capture PINs.

The company's head of research says: "What we have found reveals that criminals can compromise the mPOS payment terminal and get full control over it. This would allow an attacker to gather PIN and credit card data, and event change the software on the device so that it accepts illegitimate payments."

Reporting their findings at the SyScan security conference in Singapore, the team showed that they were even able to use an iZettle-branded card reader built by Miura Systems - which provides devices to PayPal, Payleven and Worldpay, among others - to play a simplified version of the popular game Flappy Bird:

Chippy Pin from Nils on Vimeo.


MWR is refusing to provide any details on how it hacked the readers but says that it has notified the vendors involved.

In a statement, device maker Miura says: "It has come to our attention that at the Syscan '14 Conference currently being held in Singapore certain vulnerabilities were identified in a number of mPOS PIN entry solutions, from a variety of manufacturers.

"An mPOS PIN entry solution designed by Miura Systems Limited was mentioned as having potential vulnerabilities, despite there being no evidence or indication that any loss has been suffered from any historical attack on these perceived weaknesses.

"Miura continues to maintain and invest in providing advances in preventing fraudulent activity and its solutions are independently tested by PCI (Payment Card Industry) against whose standards all Miura solutions are validated. As such, Miura's mPOS PIN entry solutions remain fully compliant with PCI PTS 3.0 & are UKCC Certified."

Comments: (2)

A Finextra member
A Finextra member 07 April, 2014, 15:31Be the first to give this comment the thumbs up 0 likes

There's an app for that:  

http://tinyurl.com/k6st67s


A Finextra member
A Finextra member 08 April, 2014, 03:56Be the first to give this comment the thumbs up 0 likes

MWR should publish the result in detail for benefit of Merchants and banks.

Trending