Google Wallet Contains PIN Exposure Flaw

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378


Softpedia said:
After viaForensics identified a number of vulnerabilities in Google Wallet that may be utilized by cybercriminals to launch social engineering attacks with the purpose of obtaining sensitive information, zvelo researchers found an even bigger issue that exposes the software’s PIN to brute-force attacks.

Not only did the experts confirm the findings of viaForensics, but they also found a way to uncover the 4-digit PIN entered by users to authenticate and access the Secure Element (SE), a device that stores and encrypts the most sensitive data.

This PIN is actually the extra security measure specific to Near-Field Communication (NFC) systems, a component that’s not present in traditional physical credit cards. The feature ensures that the Google Wallet locks itself up after a few failed attempts to protect the credit card information.

After some poking around in the Wallet’s database, the experts came across a table named metadata that contains a row identified as deviceInfo. After realizing that the data was compiled using Google’s own “Protocol Buffers,” with the aid of a custom .proto file they managed to access the contents of the binary data.

Among other things such as Unique User ID, Google account information, Cloud to Device Messaging account information, and Google Wallet Setup status, the researchers came across a PIN information section that contained a long integer salt and a SHA256 hex encoded string hash.

By knowing that the PIN only comprises four digits, they managed to reveal the access code easily with the aid of a brute force attack. The attack allowed them to guess the PIN in one single try, giving them access to the most sensitive data stored in Google Wallet.

Google rushed to address the issue, but ran into some obstacles. The main impediment occurred after they updated the code and got it approved and signed by the SE manufacturers.

To solve the issue they had to move the PIN verification into the SE itself, thus giving the banks the task of protecting the PIN

Read more
 
Last edited:
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top