Incident: Flaw in EMV Chip-Based Credit Card System Exposes Vulnerability.

Published Date: 2016-08-05

Postmortem Analysis
Timeline 1. The software failure incident happened in August 2016. Explanation: Step 1: The article was published on August 5, 2016, and it mentions the events happening at the Black Hat computer security conference on Wednesday, which implies the incident occurred shortly before the publication date. Step 2: Published on 2016-08-05. Step 3: The incident likely occurred in August 2016.
System 1. EMV chip-based credit card system [46991]
Responsible Organization 1. Computer security researchers at the payment technology company NCR [46991]
Impacted Organization 1. Retailers in the United States were impacted by the software failure incident involving flaws in the chip-based credit card system [46991].
Software Causes 1. Lack of encryption in the transaction process of retailers' payment machines [46991] 2. Failure to encrypt the data on the magnetic stripe of credit cards, allowing for rewriting by thieves [46991]
Non-software Causes 1. Lack of encryption in the transaction process during credit card payments, leaving the data vulnerable to manipulation [46991]. 2. Retailers not activating point-to-point encryption on payment machines, despite it being available from major machine makers like Verifone and Ingenico [46991]. 3. Retailers focusing on securing their computer networks supporting payment systems rather than securing the actual conversation between credit cards and machines, leading to potential vulnerabilities [46991].
Impacts 1. The software failure incident involving a flaw in the upgrade to chip-based credit cards in the United States allowed credit card thieves to rewrite the magnetic stripe code, making it appear like a chipless card again, enabling them to continue counterfeiting [46991]. 2. The discovery of this flaw in the EMV system raised doubts about the effectiveness of the chip-based system in preventing credit card fraud, potentially undermining consumer trust in the security of chip cards [46991]. 3. Retailers were faced with the challenge of spending millions of dollars to upgrade to EMV technology but still not being able to fully protect their customers from credit card theft, similar to the Target and Home Depot hacks from two years prior [46991]. 4. The incident highlighted the issue of payment terminal makers producing machines without encryption by default, requiring retailers to pay extra for basic security measures, leading to additional costs for businesses [46991]. 5. The software failure incident emphasized the importance of encrypting all aspects of a transaction to enhance security, with recommendations for shops to encrypt everything in a transaction and for consumers to use special apps on their phones and watches for payments when available [46991].
Preventions 1. Implementing end-to-end encryption in the transaction process could have prevented the software failure incident [46991]. 2. Ensuring that payment terminal makers default to encryption in their machines could have helped prevent the flaw in the chip-based credit card system [46991]. 3. Providing retailers with encrypted machines without additional cost for basic security measures could have mitigated the vulnerability in the payment system [46991].
Fixes 1. Implementing encryption on the transaction data between credit cards and payment machines to prevent rewriting of magnetic stripe codes [46991]. 2. Ensuring that retailers and their partners activate point-to-point encryption on payment terminals provided by major machine makers like Verifone and Ingenico [46991]. 3. Encouraging consumers to use special apps on their phones and watches for payments when available as a more secure option [46991].
References 1. Computer security researchers at the payment technology company NCR [46991] 2. U.S. Payments Forum director Randy Vanderhoof [46991] 3. National Retail Federation [46991] 4. Wal-Mart executive [46991] 5. Major machine makers Verifone and Ingenico [46991] 6. Mike Weber, vice president at the IT auditing firm Coalfire [46991]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: The article mentions a flaw in the upgrade to chip-based credit cards in the United States, specifically related to the chip and magnetic stripe interaction. Computer security researchers at the payment technology company NCR demonstrated how credit card thieves can rewrite the magnetic stripe code to make it appear like a chipless card again, allowing them to keep counterfeiting. This flaw in the chip-based system was highlighted at the Black Hat computer security conference [46991]. (b) The software failure incident having happened again at multiple_organization: The article discusses how many retailers are upgrading their payment machines without encrypting the transaction, leaving a vulnerability that can be exploited by credit card thieves. The article also mentions that payment terminal makers keep producing machines without encryption by default, and retailers have to pay extra for basic security. This issue is not limited to a single organization but seems to be a common practice across multiple retailers and payment terminal makers [46991].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the flaw found in the upgrade to chip-based credit cards in the United States. Computer security researchers at NCR demonstrated how credit card thieves can rewrite the magnetic stripe code to make it appear like a chipless card again, allowing them to keep counterfeiting just like they did before the nationwide switch to chip cards [46991]. (b) The software failure incident related to the operation phase is highlighted by the lack of encryption in the transaction process when retailers upgrade their payment machines to the EMV system. The failure in operation occurs because many retailers are not encrypting the transaction, leaving the data on the magnetic stripe vulnerable to alteration, which could fool the terminal but would be rejected on the back end [46991].
Boundary (Internal/External) within_system (a) within_system: The software failure incident described in the article is primarily within the system. The flaw in the upgrade to the chip-based credit cards in the United States was due to a relatively easy way for credit card thieves to rewrite the magnetic stripe code to make it appear like a chipless card again, allowing them to keep counterfeiting. This flaw was demonstrated by computer security researchers at the payment technology company NCR [46991]. Additionally, the article mentions that the way many retailers are upgrading their payment machines by not encrypting the transaction contributes to this vulnerability within the system. The failure is attributed to the lack of encryption and the design of the chip-based system itself, rather than external factors. (b) outside_system: The software failure incident is not primarily due to contributing factors originating from outside the system. The article does not highlight any external factors such as external attacks or environmental issues that directly caused the software failure incident. The focus is on the flaw within the chip-based credit card system and the lack of encryption in the transaction process as internal factors contributing to the vulnerability exploited by credit card thieves [46991].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The article discusses a flaw in the upgrade to chip-based credit cards in the United States, where computer security researchers at NCR demonstrated how credit card thieves can rewrite the magnetic stripe code to make it appear like a chipless card again. This flaw allows for counterfeiting just like before the switch to chip cards, highlighting a vulnerability in the system that was not introduced by human actions but rather by the design of the system itself [46991]. (b) The software failure incident occurring due to human actions: The article mentions that many retailers are not encrypting the transaction data on their payment machines when upgrading to the chip-based system. This lack of encryption is a human action that contributes to the vulnerability exploited by credit card thieves to rewrite the magnetic stripe code, allowing for counterfeiting. Additionally, the article points out that retailers have to pay extra for basic security features like encryption, indicating a human decision to prioritize cost over security [46991].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The article mentions a flaw in the upgrade to chip-based credit cards in the United States, specifically related to the chip and magnetic strip technology [46991]. - Computer security researchers at NCR demonstrated how credit card thieves can rewrite the magnetic stripe code to make it appear like a chipless card again, exploiting a hardware vulnerability [46991]. (b) The software failure incident occurring due to software: - The article highlights a flaw in the EMV chip-based system, indicating a software vulnerability [46991]. - The researchers advised encrypting everything in a transaction to mitigate the software-related security risks [46991].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is related to a malicious objective. Computer security researchers at NCR demonstrated how credit card thieves can rewrite the magnetic stripe code on chip-based credit cards to make it appear like a chipless card again, allowing them to continue counterfeiting. This flaw in the EMV chip-based system was highlighted at the Black Hat computer security conference, indicating a deliberate attempt to exploit a vulnerability in the system for fraudulent purposes [46991].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the chip-based credit cards in the United States can be attributed to poor decisions made during the upgrade process. The article highlights that there was a glaring hole in the EMV chip-based system due to the way many retailers were upgrading their payment machines without encrypting the transaction [46991]. This lack of encryption allowed credit card thieves to rewrite the magnetic stripe code, making it appear like a chipless card and enabling them to continue counterfeiting. Additionally, the article mentions that retailers could spend millions of dollars upgrading to EMV and still not protect their customers from credit card theft, indicating a poor decision in the implementation of the upgrade.
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article. Computer security researchers at the payment technology company NCR discovered a flaw in the chip-based credit cards' system, which allowed credit card thieves to rewrite the magnetic stripe code to make it appear like a chipless card [46991]. This flaw was possible due to the way many retailers were upgrading their payment machines without encrypting the transaction, highlighting a lack of professional competence in implementing proper security measures. (b) The accidental software failure incident is also apparent in the article. The flaw in the chip-based credit cards' system, allowing credit card thieves to exploit the magnetic stripe code, was not intentional but rather a result of oversight in the upgrade process. The discovery of this flaw was unexpected and not deliberately introduced, indicating an accidental introduction of vulnerabilities in the system [46991].
Duration temporary The software failure incident described in the articles can be categorized as a temporary failure. The flaw in the upgrade to the chip-based credit cards in the United States, as highlighted by computer security researchers at NCR, demonstrated how credit card thieves could rewrite the magnetic stripe code to make it appear like a chipless card again, allowing them to continue counterfeiting [46991]. This flaw was identified as a specific vulnerability introduced by certain circumstances, such as the lack of encryption in the transaction process, rather than a permanent failure affecting all circumstances.
Behaviour value, other (a) crash: The articles do not mention a specific instance of a system crash where the system loses state and does not perform any of its intended functions. (b) omission: The software failure incident described in the articles does not directly involve the system omitting to perform its intended functions at an instance(s). (c) timing: The articles do not discuss a failure related to the system performing its intended functions correctly but too late or too early. (d) value: The software failure incident discussed in the articles is related to the system performing its intended functions incorrectly. Specifically, the flaw in the upgrade to chip-based credit cards allows credit card thieves to rewrite the magnetic stripe code to make it appear like a chipless card, enabling them to continue counterfeiting [46991]. (e) byzantine: The articles do not mention the system behaving erroneously with inconsistent responses and interactions, which would fall under the byzantine behavior category. (f) other: The software failure incident described in the articles involves a flaw in the system that allows credit card thieves to manipulate the magnetic stripe code, bypassing the chip-based security measures. This behavior could be categorized as a security vulnerability or exploitation of a loophole in the system's design [46991].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident discussed in the article relates to a flaw in the upgrade to chip-based credit cards in the United States. Computer security researchers demonstrated how credit card thieves could rewrite the magnetic stripe code on the cards to make them appear chipless, allowing them to continue counterfeiting. This flaw in the EMV chip-based system could potentially lead to massive credit card theft, impacting people's financial assets and data [46991].
Domain finance The software failure incident reported in the article is related to the finance industry [46991]. The incident involves a flaw in the chip-based credit card system, which is widely used in financial transactions. The flaw allows credit card thieves to rewrite the magnetic stripe code on the cards, making them vulnerable to counterfeiting. This flaw in the system poses a significant security risk to financial transactions and highlights the challenges faced by retailers in upgrading their payment systems to protect customers from credit card theft.

Sources

Back to List