Researcher Creates Gadget That Bypasses Credit Card Chip&PIN Safeguards

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Device can also accurately predict new credit card numbers
Samy Kamkar, the inventor of numerous hacking tools, has created another mind-blowing device, one that can accurately read and predict credit card numbers, and bypass chip & PIN safeguards embedded within modern cards.

The device, called MagSpoof uses information stored on credit/debit cards, inside the standard magstripe (magnetic strip).

Hackers can analyze the magnetic field produced by this magnetic strip, and then store it on MagSpoof. Since the magstripe is used to validate card transactions, the card's number and other details are encoded in the magnetic strip itself.

RTFKmgO.gif


MagSpoof can make payments by placing it in the vicinity of a card reader
Data can be extracted from magstripes using magstripe readers, or by eye, using metal dust that sticks to the magnetic parts of the magstripe and allows anyone to read the barcode.

By taking this data and feeding it to MagSpoof, Kamkar says he was able to make financial transactions just by placing his device next to PoS payment readers that work based on magstripe readers.

This was possible because MagSpoof, using the magstripe data it was just fed, reproduced that magnetic field at a higher intensity, allowing Kamkar to trigger the payment wirelessly, without actually swiping the card.

Kamkar also says that data from multiple magstripes can be stored on his device at the same time and that MagSpoof can also disable chip&PIN (CnP) safeguards.

MagSpoof can trick card readers, telling them it's a card without a chip (and PIN)
Because PIN requirements are coded as a bit inside the magstripe, which tells the card reader to ask for a PIN, Kamkar just flipped this bit to say the card has no CnP support.

Additionally, because of some of the procedures used when issuing credit/debit card replacements, Kamkar also added a functionality that can predict credit card numbers based on the expiration date from the previous card.

This functionality, if it ever fell into the wrong hands, would allow criminals to use a credit card after it was cancelled, by simply adjusting the magstripe data based on Kamkar's algorithm.

MagSpoof costs around $10 / €9.3 to build and was tested only with American Express-issued cards. Its source code is available on GitHub, but Kamkar has removed the parts that would have allowed hackers to abuse it for fraudulent operations.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top