Summary of "How Secure Is Tap To Pay?"

Summary — How Tap-to-Pay can be abused (technology, demo, risks, mitigations)

What happened (demo)

How the attack works (technical steps)

Tap-to-Pay (EMV contactless) terminals and phones exchange transaction messages via NFC. Many of these messages are unencrypted for compatibility and can be intercepted and altered. Researchers inserted themselves between the phone and the reader and relayed/modified messages:

  1. The proxmark impersonates a reader to the phone and forwards messages to the laptop.
  2. The laptop modifies specific transaction bits and forwards them to a burner phone.
  3. The burner phone taps the real terminal; the terminal thinks it’s talking to the phone, and the phone thinks it’s talking to the terminal.

To trick both sides the attackers falsified three specific fields (three “lies”):

  1. Transit/offline bit — make the phone believe the reader is a transit terminal (Express Transit Mode) so the phone won’t require unlocking.
  2. High/low value bit — flip the “high value” flag to indicate a low-value transaction so the phone won’t demand customer verification (PIN/fingerprint).
  3. Customer verification result bit — flip the phone’s response to tell the reader the transaction was verified by the user, so the reader will accept and forward the transaction to the bank.

Why this works for some devices/cards and not others

Cryptography explained briefly

Practical risk, scope, and history

Mitigations and practical guidance

Immediate user actions:

Longer-term / industry mitigations:

Additional notes

Main speakers / sources

Category ?

Technology


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video