The idea of paying for items using your cell phone is not new by any means. Nokia had presented a way of using their phones to pay for items in vending machines quite a while ago and other phone makers had used similar systems. Now, there is a big push to use Near Field Communication (NFC) for making payments. Again these have been around for a while with payment systems like Mobil’s Speed Pass and MasterCard’s PayPass. All you need is an RFID device (Radio Frequency Identifier) that is coded to with your account information and you are good to go. However, these systems have zero security. If you lose the credit card or your pay token almost anyone can use them.
This is where software programs like Google Wallet are supposed to come in. They will still use the NFC system and an RFID device (built into the Phone) but will also add user interaction as an additional step for security. The problem is that lazy coding in an attempt to keep development AND hardware costs down have resulted in another insecure application. According to Joshua Rubin at zveloBLOG Google put everything you need in simple binary form inside the sqlite3 database used by Google wallet.
By creating a custom .proto file (used to read the binary data) they were able to skim Unique User IDs (UUID), Google account information (GAIA), Push notification information, Wallet setup status, Trusted Services Status, SE Status, Card Protection Lifecycle and best of all the PIN number needed to access your Google Wallet. To add insult to injury the PIN included the Salt and Hash information (just to make the failure complete).
All of this was found in a table called DeviceInfo. Now, to me it seems that the lack of true hardware encryption (AES256 or similar). Now Google can move the PIN into the CE but that could possibly mean that the card issuer (the bank) would have to approve the security of the PIN which could take considerably longer to gain approval on. It may also cost Google some extra money if the banks want to impose that one them (and many banks will).
Fortunately there are only two phones that have the NFC system and Google wallet running right now and those are the Google Nexus S on Sprint’s network and the Galaxy Nexus. Another solace is that this attack is unlikely to be run remotely as it requires the phone to be rooted to work. Now, that is not to say there are not other vulnerabilities that could allow a piece of malware to access the Google Wallet database it is just less likely. The down side is that this exploit would be easy to put into place if the phone was stolen.
There are the usual steps to protect yourself from this; update your phone, enable a lock screen with a password or pin, disable USB Debugging, enable full disk encryption, and do not root the phone. Personally we feel that these moves are being rushed without proper concern for security and data protection. This is in an effort to be first to market all in the interest of making money at the expense of the consumer.
Discuss this in our Forum
From The Blog
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 1226 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 736 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 1111 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 904 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 976 times Read more...
-
Leaked Data from Duolingo incident Shows US is most Impacted
Written by Sean KalinichDuolingo, is a language learning site (not to be confused with an LLM) and has a very large base of users. The site is a…Written on Tuesday, 29 August 2023 19:12 in Security Talk Read 1389 times Read more...
-
We talk about the Ransomware Threat Landscape with SecureWorks at Black Hat 2023
Written by Sean KalinichBlack Hat 2023 – Las Vegas, NV – One of my personal focuses is understanding the “Why” behind changes in the threat landscape. In simple…Written on Tuesday, 29 August 2023 18:26 in Security Talk Read 987 times Read more...
-
Now Patched Flaw Leverages Abandoned Reply URL found in Entra ID allows for Privilege Escalation
Written by Sean KalinichMicrosoft has not been having the greatest of months. First it was identified that a stollen MSA signing key was used by a Nation State…Written on Monday, 28 August 2023 15:39 in Security Talk Read 1605 times Read more...
-
Qrypt Looking to Attack the Inefficiencies in Quantum Encryption to make Quantum Secure Communication a Reality Today
Written by Sean KalinichBlack Hat 2023, Las Vegas – At Black Hat one of my favorite things to do is see what the latest buzzword(s)/phrases are. One of…Written on Monday, 28 August 2023 12:53 in Security Talk Read 1100 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115677 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 85921 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 80303 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 78999 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 69154 times Read more...
Google Wallet stores your PIN in readable binary form
Written by Sean KalinichReading time is around minutes.
There is an old saying; buy cheap and sell dear that came about in the Carnegie days and has been in use by corporations for so long that it is just the way they do things. What this means now is that corporations will always look for the quick and easy way to do things. This is not a big shocker; after all most companies will want to minimize costs and maximize their profits. Where this hurts the consumer is that many times minimizing costs ends up being translated to security or product quality. A perfect example would be Apple’s move to Foxconn. Yes they reduced their operating costs, but the product quality realistically has gone down. Another place where we see cuts are in security and network protections of user data. A good example of this can be found in Google Wallet.
Latest from Sean Kalinich
- NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
- Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
- Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
- Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
- Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Leave a comment
Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.