In his presentation, Mendoza has shown how the payment tokens that are generated during the usage of Samsung Pay can be intercepted or (less credibly) even be fabricated by hackers to exploit users of Samsung's mobile payment service.
Mendoza's presentation showed how the payment tokens can be skimmed or intercepted. Tokens are sent from the mobile device to the payment terminal, implying the hacker needs to be standing close by. Since the tokens are single-use only, and expire within 24 hours, the payment will need to be halted after authentication for the token to remain valid and be misused. He even claims that the payment token generated by the South Korean company can be hypothetically figured out, and then used to develop tokens that can make purchases. However, Mendoza does not say he was able to generate any fake tokens himself.
Samsung in an FAQ responds to Mendoza's Defcon presentation says that "token skimming" can be exploited, however, "multiple difficult conditions must be met", which include close proximity to the user - as MST is a very short range communication system. The hacker will also have to either jam the signal before it reaches the payment terminal for the token to remain usable, or, somehow trick the user to stop the transaction after authentication. If despite all this, a hacker manages to get hold of a usable payment token, as soon as a transaction is made with it, the user will be notified on the associated smartphone - allowing them to alert authorities. As The Verge points out however, the entire process could be as simple as "setting up a fake payment terminal in a shop."
The company has further clarified that the entire process of stealing and using payment tokens can apply to other payment systems as well - something that Mendoza himself admits to ZDNet - such as debit, credit, and payment cards.
As for the claim that hackers will be able to generate their own Samsung Pay payment tokens after analysing patterns, Samsung responded by saying, "It is important to note that Samsung Pay does not use the algorithm claimed in the Black Hat presentation to encrypt payment credentials or generate cryptograms."Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.
Blue Origin Joins SpaceX in Orbital Booster Reuse Era With New Glenn’s Successful Launch and Landing
AI-Assisted Study Finds No Evidence of Liquid Water in Mars’ Seasonal Dark Streaks