Incident: Contactless Payment Technology Vulnerability Exposes 30 Million Bank Cards

Published Date: 2013-06-01

Postmortem Analysis
Timeline 1. The software failure incident of contactless payment technology vulnerability, where 30 million 'wi-fi' credit cards could be plundered by cyber identity thieves, happened in April 2012 [Article 18769].
System 1. Contactless payment technology system [18769]
Responsible Organization 1. Cyber identity thieves exploiting contactless payment technology [Article 18769]
Impacted Organization 1. Debit and credit card holders, as their personal data could be mined by thieves exploiting a loophole in contactless payment technology [Article 18769].
Software Causes 1. Software vulnerability in contactless payment technology allowing thieves to wirelessly copy card details [Article 18769]
Non-software Causes 1. Lack of proper security measures in contactless payment technology, making it vulnerable to exploitation by thieves [18769]. 2. Flaws in the design and implementation of contactless cards, allowing for easy data theft [18769]. 3. Accidental charging issues on London buses due to the contactless payment system [18769].
Impacts 1. Personal data of millions of debit and credit card holders was at risk of being mined by cyber identity thieves exploiting contactless payment technology, leading to potential financial losses and unauthorized transactions [Article 18769]. 2. Contactless cards were vulnerable to being wirelessly copied by modified mobile phones, allowing thieves to access cardholder information such as name, 16-digit number, expiry date, and even the last ten transactions made on the account [Article 18769]. 3. Accidental charging occurred when users swiped their Oyster cards on London buses, resulting in the universal fare being taken from their bank cards in the same wallet [Article 18769]. 4. Customers experienced issues with contactless card-readers at retailers like Marks & Spencer and Pret A Manger, where money was taken wirelessly when they intended to pay by chip and PIN, potentially leading to unexpected charges and financial inconvenience [Article 18769].
Preventions 1. Implementing stronger encryption and security measures in contactless payment technology to prevent unauthorized access to card details [Article 18769]. 2. Regularly updating and patching the software used in contactless payment systems to address any identified vulnerabilities [Article 18769]. 3. Conducting thorough security testing and risk assessments on contactless payment technology before widespread implementation to identify and mitigate potential flaws [Article 18769].
Fixes 1. Implementing more secure contactless payment technology that addresses the vulnerabilities exploited by cyber identity thieves [Article 18769]. 2. Issuing new cards with enhanced security features to replace older vulnerable cards [Article 18769]. 3. Conducting thorough research and testing to identify and rectify flaws in contactless bank-card technology [Article 18769]. 4. Collaborating with security experts and researchers to address the loopholes in the contactless payment system [Article 18769]. 5. Updating the contactless card technology to block access to sensitive information like the cardholder's name [Article 18769].
References 1. Security expert Martin Emms and his team of researchers at Newcastle University’s Centre for Cybercrime and Computer Security [18769] 2. Ross Anderson, professor of security engineering at Cambridge University [18769] 3. Transport for London (TfL) [18769] 4. Shashi Verma, Director of Customer Experience at TfL [18769] 5. Marks & Spencer and Pret A Manger customers [18769] 6. UK Cards Association [18769] 7. Visa Europe [18769]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to contactless payment technology and the vulnerability of contactless cards being exploited by cyber identity thieves has happened again at Barclays. In April 2012, Barclays began to issue new cards they claimed were more secure after fears were expressed about the flaws in contactless cards [18769]. (b) The software failure incident related to contactless payment technology and the vulnerability of contactless cards being exploited by cyber identity thieves has also happened at other organizations or with their products and services. The criticisms and warnings from security analysts and experts indicate that the contactless technology could be 'wide open to exploitation' by thieves, not just limited to Barclays but across the industry [18769].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The vulnerability in the contactless payment technology that allowed thieves to exploit a loophole and wirelessly copy card details using modified mobile phones highlights a failure in the design of the system [18769]. (b) The software failure incident related to the operation phase is also apparent in the article. The unintended charging of bank cards when users swipe their Oyster cards on London buses showcases a failure in the operation or usage of the contactless payment system [18769].
Boundary (Internal/External) within_system (a) within_system: The software failure incident related to the contactless payment technology vulnerability is primarily within the system. The flaw in the contactless card technology allowed thieves to exploit the system by using modified mobile phones to wirelessly copy card details [18769]. The vulnerability within the system enabled unauthorized access to cardholder information, leading to potential data theft and unauthorized transactions.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the article is related to non-human actions, specifically the vulnerability in the contactless payment technology that allows thieves to exploit the system without human participation. The flaw in the technology enables modified mobile phones to wirelessly copy card details, putting millions of bank cards at risk of having their data read by unauthorized devices [18769]. (b) On the other hand, human actions also play a role in this software failure incident. The article mentions that security expert Martin Emms and his team at Newcastle University's Centre for Cybercrime and Computer Security adjusted a touch screen phone with parts bought online to demonstrate how easily card details can be stolen. Additionally, the article highlights concerns raised by Professor Ross Anderson from Cambridge University about the haphazard rollout of contactless cards without careful consideration of the consequences, emphasizing the role of human decisions in the vulnerability of the technology [18769].
Dimension (Hardware/Software) hardware (a) The software failure incident occurring due to hardware: The incident described in the article is related to a vulnerability in contactless payment technology that allows thieves to exploit a loophole in the hardware of contactless cards. Modified mobile phones can be used to wirelessly read card details from contactless cards, indicating a hardware vulnerability in the contactless payment technology [18769]. (b) The software failure incident occurring due to software: The software failure incident in this case is not directly related to a software issue but rather to a vulnerability in the contactless payment technology that allows unauthorized access to card details. The vulnerability allows thieves to exploit the hardware of contactless cards using modified mobile phones, indicating a flaw in the design or implementation of the contactless payment technology rather than a software-specific failure [18769].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles is malicious in nature. Cyber identity thieves are exploiting a loophole in the contactless payment technology to plunder credit card details. They are using modified mobile phones to wirelessly copy card numbers and personal details from contactless cards without the card-owners knowing. This act is done with the intent to steal personal data and make unauthorized purchases, posing a significant risk to millions of bank cardholders [18769].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the contactless payment technology can be attributed to poor decisions made in the design and implementation of the system. The flaws in the contactless card technology, which allowed for easy exploitation by thieves, were a result of inadequate consideration of security implications and vulnerabilities. The rushed rollout of contactless cards without thorough testing and assessment of potential risks led to a situation where millions of bank cards were at risk of having their data read by modified mobile phones [18769]. The lack of foresight in addressing these vulnerabilities before widespread adoption of the technology highlights the poor decisions made in the development and deployment of the contactless payment system.
Capability (Incompetence/Accidental) accidental (a) The articles do not mention any software failure incident related to development incompetence. (b) The software failure incident mentioned in the articles is related to accidental factors. The incident involves the accidental charging of bank cards when users swipe their Oyster cards on London buses [18769]. This accidental charging issue has led to complaints from customers and is expected to escalate when the ability to pay fares with contactless bank cards is extended to the London Underground.
Duration permanent The software failure incident described in the articles is more of a permanent nature. The vulnerability in the contactless payment technology that allowed thieves to wirelessly copy card details and make unauthorized transactions is a fundamental flaw in the system itself, making it a long-term issue [18769]. The flaw in the technology, which allowed for easy exploitation by thieves using modified mobile phones, was a systemic problem that required more comprehensive solutions from the banks and technology providers to address the underlying security issues.
Behaviour omission, value (a) crash: The software failure incident described in the articles can be related to a crash behavior. The incident involves a vulnerability in contactless payment technology that allows thieves to wirelessly copy card details using modified mobile phones, leading to potential unauthorized transactions [18769]. (b) omission: The software failure incident can also be associated with an omission behavior. Users of contactless cards have reported instances where their bank cards were mistakenly charged when they swiped their Oyster cards on London buses, indicating an omission in the system's intended function [18769]. (d) value: Additionally, the software failure incident can be linked to a value behavior. The flaw in the contactless card technology allows thieves to obtain sensitive information such as the account-holder's name, 16-digit number, expiry date, and even the last ten purchases, enabling them to make purchases online without the need for further security checks [18769].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident described in the articles pertains to a vulnerability in contactless payment technology that allows thieves to exploit the system and potentially steal personal data from millions of debit and credit card holders. The flaw in the contactless cards enables criminals to wirelessly copy card details using modified mobile phones, leading to the potential theft of account-holder's names, 16-digit card numbers, expiry dates, and even the last ten transactions made on the account [18769]. This breach of security poses a significant risk to individuals' financial assets and personal information, highlighting the impact on people's property as a consequence of the software failure incident.
Domain finance (a) The failed system in the article is related to the finance industry. The incident involves the vulnerability of contactless payment technology, which puts millions of debit and credit card holders at risk of having their personal data mined by cyber identity thieves [Article 18769]. The flaw in the contactless card technology allows thieves to wirelessly copy card details using modified mobile phones, potentially leading to unauthorized purchases and financial losses for the cardholders. The incident highlights the security concerns and risks associated with the use of contactless payment technology in the finance sector.

Sources

Back to List