Categories: Mobile

Mobile payment system Square can be hacked, claims researchers

Square enables smartphone users to process credit card transactions remotely

Two researchers attending the Black Hat security conference yesterday in Las Vegas have demonstrated a simple hacking technique that could allow unscrupulous individuals to purchase items using the mobile payment system Square and stolen credit card data. With this technique, would-be hackers could use stolen credit card data to withdraw funds without the need to be in possession of the physical credit card.

This hacking technique is made possible by the way in which Square works. Square is a mobile payment system that exists as a physical smartphone attachment or dongle and an Android or iOS mobile app. Users pay for goods by swiping their credit card through the Square dongle. The dongle creates a simple audio file containing the user’s credit card data that is then sent to the Square mobile app, processed and authorised by the appropriate credit card issuer. As it stands however, the audio files’ origins are not verified by the app so don’t necessarily have to be generated by the official dongle.

The two researchers, Adam Laurie and Zac Franken, created a simple program themselves that reads magnetic strip data from credit cards which is then converted to an audio file. This audio file can then be played into the Square dongle and the data is sent directly to the Square app for processing. The app does not distinguish between a proper credit card swipe and an audio file played into the device.

In this regard, stolen credit cards data could be stored efficiently in audio files and sold to dubious buyers. The Square app is due to be updated in the near future and will likely patch this vulnerability. Or instead, Square may issue new dongles that encrypt audio file data.

Albizu Garcia

Albizu Garcia is the Co-Founder and CEO of Gain -- a marketing technology company that automates the social media and content publishing workflow for agencies and social media managers, their clients and anyone working in teams.

Recent Posts

WEF calls on stakeholders to ‘inoculate’ public against disinformation ‘super-spreaders’: report

Those who decry 'disinformation' the loudest almost never give any examples of what they're denouncing:…

6 hours ago

Shift left, ship fast: How software teams can offer speed without sacrificing quality (Brains Byte Back Podcast)

Even the biggest software companies understand that moving quickly is no longer a luxury; it's…

1 day ago

Extremists weaponize COVID, climate issues with conspiracy theories about state & elite control: RAND Europe

The RAND Europe authors are so stuck in their own echo chamber they don't realize…

5 days ago

Digital ID, vaccine passports are expanding to pets & livestock: UN AI for Good report

Humans, animals & commodities alike are all to be digitally tagged, tracked-and-traced equally: perspective The…

1 week ago

Teaching with tech: What’s changing and why It Matters (Brains Byte Back Podcast)

Teaching has changed a lot over the years, from chalkboards to laptops, from printed worksheets…

1 week ago

‘Enormously intrusive’ collaborative sensing is beneficial to society: WEF podcast

The massive city-wide surveillance that collaborative sensing requires is a tremendous temptation for tyrants: perspective…

2 weeks ago