Skip to content

Πιστωτικές κάρτες με κενά… ασφαλείας

Φεβρουαρίου 12, 2010

Δεν είναι πρόσφατη η αποκάλυψη ότι οι νέες πιστωτικές κάρτες με ενσωματωμένο chip, έχουν προβλήματα.

Συγκεκριμένα από τον Αύγουστο του 2008, σε ποστ του ο Steven Murdoch αποκάλυψε τα κενά ασφαλείας χωρίς όμως τελικά να πάρει δημοσιότητα το θέμα και να βρεθούν λύσεις. Απόδειξη για την μη κάλυψη των προβλημάτων αποτελεί το paper των Steven Murdoch, Saar Drimer, Mike Bond, και Ross Anderson και το ποστ του τελευταίου όπου εξηγείται αναλυτικά το πρόβλημα.

Ενδεικτικά οι ερευνητές του Computer Laboratory, University of Cambridge, αναφέρουν στο δελτίο τύπου τους ότι:

Cambridge researchers show that the Chip and PIN system is vulnerable to fraud

Thursday, 11 February 2010

Steven J. Murdoch, Saar Drimer, Ross Anderson and Mike Bond, researchers at the Computer Laboratory, University of Cambridge, have shown that flaws in the Chip and PIN system allow criminals to use stolen credit and debit cards, without knowing the correct PIN.

Fraudsters can easily insert a “wedge” between the stolen card and terminal, which tricks the terminal into believing that the PIN was correctly verified. In fact, the fraudster can enter any PIN, and the transaction will be accepted.

Murdoch says, “We have tested this attack against cards issued by most major UK banks. All have been found to be vulnerable.”

Victims of this attack may have a difficult time being refunded by their bank. The receipt produced will state “Verified by PIN”, and bank records will show that the correct PIN was used. Banks may then argue that the customer must have been negligent and had allowed the criminal to know their PIN.

Drimer says, “The technical sophistication for carrying out this attack is low, and the compact equipment will not be noticed by shop staff. A single criminal can develop and industrialize a kit to be used by others who do not need to understand how the attack works.”

The Cambridge attacks call into question both the design of the Chip and PIN system, and the security of card payments. Victims of fraud are commonly told that bank systems can be relied upon. However, this attack shows that criminals are able to not only defraud customers, but cause bank systems to make the false assertion that the PIN was verified correctly.

Anderson said «Over the past five years, thousands of cardholders have had stolen chip and pin cards used by criminals. The banks often tell customers that their pin was used and so it’s their fault. Yet we’ve shown that it’s easy to use a card without knowing the pin – and the receipt will say the transaction was ‘verified by pin’ even though it wasn’t.»

Anderson continued «This is not just a failure of bank technology. It’s a failure of bank regulation. The ombudsman supported the banks and the regulators have refused to do anything. They were just too eager to believe the banks.»

The attack will be featured on Newsnight, including a demonstration of it being deployed in practice. Watch BBC Two, 10:30pm, Thursday 11 February 2010.

The Cambridge team’s results are also to be presented at the the academic conference “IEEE Symposium on Security and Privacy”, Oakland, CA, US, May 2010.

Notes for editors

1. For more information on Chip and PIN wedge attacks, please see our webpage on this topic:

2. The academic paper, accepted for a peer-reviewed conference, can be found at:

3. The latest version of this press release can be found at:

4. For any further questions, please contact:

Dr Saar Drimer

phone: 01223 763 532

mobile: 07779 606 045



Professor Ross Anderson

phone: 01223 334 733

mobile: 0791 905 8248



Dr Steven J. Murdoch



Ελπίζω ότι στην χώρα μας έχουμε πάρει τα σωστά μέτρα και ότι σύντομα θα ενημερωθούμε για τις λύσεις και βέβαια για τον τρόπο προστασίας μας από τις αδυναμίες στην ασφάλεια των νέων πιστωτικών καρτών που κυκλοφορούν σε εκατομμύρια στην Ευρώπη.

No comments yet


Εισάγετε τα παρακάτω στοιχεία ή επιλέξτε ένα εικονίδιο για να συνδεθείτε:


Σχολιάζετε χρησιμοποιώντας τον λογαριασμό Αποσύνδεση /  Αλλαγή )

Φωτογραφία Google+

Σχολιάζετε χρησιμοποιώντας τον λογαριασμό Google+. Αποσύνδεση /  Αλλαγή )

Φωτογραφία Twitter

Σχολιάζετε χρησιμοποιώντας τον λογαριασμό Twitter. Αποσύνδεση /  Αλλαγή )

Φωτογραφία Facebook

Σχολιάζετε χρησιμοποιώντας τον λογαριασμό Facebook. Αποσύνδεση /  Αλλαγή )


Σύνδεση με %s

Αρέσει σε %d bloggers: