{"id":1110,"date":"2021-02-22T10:28:24","date_gmt":"2021-02-22T04:58:24","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1110"},"modified":"2021-06-07T10:54:03","modified_gmt":"2021-06-07T05:24:03","slug":"attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/","title":{"rendered":"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Security researchers detected an updated novel attack that permits the hackers to trick victims of MasterCard and using it as the Visa card.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">In September 2020, the researcher published a report that delivered a PIN bypass attack and permits the hackers to steal Visa EMV-enabled credit card and making a high-value purchase without the cards PIN and the attackers fool the organizations by doing the unauthorized offline transitions.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The research also added that this is not just about mere card brand mix-up, it has its critical consequences. For example, the attackers use the combination to bypass the PIN of stolen cards.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">These master card hacks implemented the defense mechanisms works at the network level to lead such attacks. These discoveries will lead to the 30th USE-NIX Security Symposium in August.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Card Brand Mixup Attack?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"728\" height=\"380\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/card-attack-visa-master-image.jpg\" alt=\"Attackers user New Vulnerabilities and Bypass MasterCard PIN as Visa Card\" class=\"wp-image-1114\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/card-attack-visa-master-image.jpg 728w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/card-attack-visa-master-image-300x157.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n\n<p><p style=\"text-align: justify\">Likewise, in the previous attack that involves the Visa card, this update attack also exploits serious vulnerabilities and widely used as EMV contact-less protocol that is used to target the MasterCard itself.<\/p><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<p class=\"responsive-video-wrap clr\"><iframe loading=\"lazy\" title=\"Demo: Bypassing the PIN for a Maestro card\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/8d7UgIiMRBU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<\/div><\/figure>\n\n\n\n<p><p style=\"text-align: justify\">If we talk about EMV Kernel, it is a set of functions that delivered all the information required while processing the logic and data. This entire attack takes the advantage of the fact that these AIDs are not authorized while making the payment and it is also possible that they deceive the terminal by manipulating the kernel and its extension. The bank that assists the payments on the behalf of the merchant will accept the contactless payments with the help of PAN and AID authorization that is used for different cards.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">These hackers perform the Visa transaction through the terminal and MasterCard transaction through the card. However, the necessitates meets the number of queries and the hackers have the access to the user&#8217;s cards that being used while modifying the terminal\u2019s commands and the response of the card before the cross verification. Whereas it is not required to root the device or use any other vulnerabilities present in the Android device as the proof-of-concept.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The research also noted that the other vulnerabilities present in EVM contact-less method, that assist the criminals by gathering all the information needed through the Visa protocol from the ones who don\u2019t have the Visa card.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Countermeasures<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"510\" height=\"183\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/card-attack-visa-master-image-1.jpg\" alt=\"Attackers user New Vulnerabilities and Bypass MasterCard PIN as Visa Card\" class=\"wp-image-1112\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/card-attack-visa-master-image-1.jpg 510w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/card-attack-visa-master-image-1-300x108.jpg 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">While securing your card and transaction you should use the PoC android application. The ETH researched also said that the attacker can bypass the PIN used for verifying the transaction with the help of MasterCard or Debit card that deals with two Maestro debit and Master credit cards issued by different banks and whose transaction limit is exceeding $400.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The organizations added multiple countermeasures that deal with using the financial institutions that consist of AID authorization data and permits the cards to check the user&#8217;s AID and verify PAN.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The payment network also checks the other consequences of data points present while doing the authorization and easily caught these types of attacks by declining the fake transactions right away.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers detected an updated novel attack that permits the hackers to trick victims of MasterCard and using it as the Visa card. In September 2020, the researcher published a report that delivered a PIN bypass attack and permits the hackers to steal Visa EMV-enabled credit card and making a high-value purchase without the cards [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1124,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Security researchers detected an updated novel attack that permits the hackers to trick victims of MasterCard and using it as the Visa card. In September 2020, the researcher published a report that delivered a PIN bypass attack and permits the hackers to steal Visa EMV-enabled credit card and making a high-value purchase without the cards [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-22T04:58:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:24:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/visa-master-vulnerability-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1691\" \/>\n\t<meta property=\"og:image:height\" content=\"879\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!\",\"datePublished\":\"2021-02-22T04:58:24+00:00\",\"dateModified\":\"2021-06-07T05:24:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\"},\"wordCount\":504,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\",\"url\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\",\"name\":\"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-02-22T04:58:24+00:00\",\"dateModified\":\"2021-06-07T05:24:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/","og_locale":"en_US","og_type":"article","og_title":"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card! - Xiarch Solutions Private Limited","og_description":"Security researchers detected an updated novel attack that permits the hackers to trick victims of MasterCard and using it as the Visa card. In September 2020, the researcher published a report that delivered a PIN bypass attack and permits the hackers to steal Visa EMV-enabled credit card and making a high-value purchase without the cards [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-02-22T04:58:24+00:00","article_modified_time":"2021-06-07T05:24:03+00:00","og_image":[{"width":1691,"height":879,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/visa-master-vulnerability-1.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!","datePublished":"2021-02-22T04:58:24+00:00","dateModified":"2021-06-07T05:24:03+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/"},"wordCount":504,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/","url":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/","name":"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-02-22T04:58:24+00:00","dateModified":"2021-06-07T05:24:03+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/attackers-use-new-vulnerabilities-and-bypass-mastercard-pin-as-visa-card\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Attackers use New Vulnerabilities and Bypass MasterCard PIN as Visa Card!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1110"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1110"}],"version-history":[{"count":2,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1110\/revisions"}],"predecessor-version":[{"id":1126,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1110\/revisions\/1126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1124"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}