HACKING NEXT-GEN ATMS

37
FROM CAPTURE TO CASHOUT HACKING NEXT-GEN ATMS Senior Security Consultant/Senior Pentester TWITTER, LinkedIN @westonhecker Rapid7 www.rapid7.com

Transcript of HACKING NEXT-GEN ATMS

Page 1: HACKING NEXT-GEN ATMS

FROM CAPTURE TO CASHOUT

HACKING NEXT-GEN ATMS

Senior Security Consultant/Senior PentesterTWITTER, LinkedIN @westonheckerRapid7 www.rapid7.com

Page 2: HACKING NEXT-GEN ATMS

A Little Bit About Myself

2

9Senior Security Engineer / Senior Pentester / Security Researcher with 12 years experience in programming and reverse engineering

9Speaker at Defcon 22, 23 and 24 Las Vegas, HOPE 11, TakedownCON 2016, B-sides Boston, Blackhat 2016, Enterprise Connect 2016, ISC2, SC Congress Toronto

9Other projects: Attacking 911 centers; malware and ransomware analysis; hacking cars, point of sale systems, hotel key systems, and property management systems.

Page 3: HACKING NEXT-GEN ATMS

3

Page 4: HACKING NEXT-GEN ATMS

EMV, Carder Systems, and Automating Cashout

9 Attacks on the EMV (Europay, MasterCard, Visa) standard

9 Relay attacks on physical cards9 A tour of a new method of distributing

stolen credit card data when transactions have 1 minute shelf life

9 Attacking next generation ATM security features

9 Look at ATM communication backendsto financial institutions

9 Introducing La-Cara: an automated Ca$hout machine (ACM?)

9 Demos representing over 400 hours of research on my own time

Page 5: HACKING NEXT-GEN ATMS

What is EMV?

• Developed in France in the 1980s• Europay, MasterCard, and Visa• It is a small chip on card• Standard managed by EMVCo• Replaces magstripe cards• Liability shift 2015-2017 in USA

Page 6: HACKING NEXT-GEN ATMS
Page 7: HACKING NEXT-GEN ATMS

Your Grampa’s BINS the past

Page 8: HACKING NEXT-GEN ATMS

Cashing out on backend ?

Confidential and Proprietary 8

Page 9: HACKING NEXT-GEN ATMS

Confidential and Proprietary 9

Complete With Spelling Errors !!

Page 10: HACKING NEXT-GEN ATMS

Acceptable timeframe for delimiting string.

5 Digit Delimitation in Time frame.

Transaction Challenge for device 1

Tunnel ID internal connection

Info TypeQuality

PINPANLimitFlags

Feedback Success AnalyticsClose Con

5 Digit Delimitation Initial Tunnel Info

Your Time Block

60 Second Block

60 Second Block

60 Second Block

60 Second Block

Page 11: HACKING NEXT-GEN ATMS

5 Digit Delimitation in Time frame.

Transaction Challenge for device 1

Tunnel ID internal connection

Info TypeQuality PIN

PANLimitFlags

Feedback Success AnalyticsClose Con

5 Digit Delimitation Initial Tunnel Info

30 SecondsReceived overInformation

Page 12: HACKING NEXT-GEN ATMS

Acceptable time Frame for Delimiting String.

5 Digit Delimitation in Time frame.

Transaction Challenge for device 1

Tunnel ID internal connectionInfo Type

QualityPIN

PANLimitFlags

Feedback Success AnalyticsClose Con

5 Digit Delimitation Initial Tunnel Info

Your Time Block

60 Second Block

60 Second Block

60 Second Block

60 Second Block

Page 13: HACKING NEXT-GEN ATMS

--STATIC MAG DATA TRACK 1 2 3 --EMV (DDA DYNAMIC AUTHENTICATION)--EMV (CDA COMBINED DATA AUTHENTICATION)--SOME 13.56 RFID NFC (NON TOKEN BASED)

REJECTS CARDS WITH FLAGS NOT SET FOR ATMASIDE FROM CARD PASS OFF BAD GUYS WILL ALSO GET PIN NUMBER AND ASSUMED ATM LIMIT

What type of credit card data is possible to be sold in Real time by the carders?

Page 14: HACKING NEXT-GEN ATMS

How is it used in this attack?

Confidential and Proprietary 14

Page 15: HACKING NEXT-GEN ATMS

Small Carder Site

Leased Gear

Mules/Store Employees

Independents/Small Breach

Here is the most likely method that sites get data that is sold.

Page 16: HACKING NEXT-GEN ATMS

Main Carder Site

Small Carder Site

Mules

Independents

Page 17: HACKING NEXT-GEN ATMS

Stage one Initial Transaction Request

Hold for Round Two

Page 18: HACKING NEXT-GEN ATMS

This is not cloning the card its relaying it X distance. There are about 1 min windows.

4 stages of EMV transaction are being captured and released into a tunnel to speak to another ATM or POS.

The cash out device regurgitates the exact “send and receive” from a shimmed device to the cash out device.

The shimmed device is told to hold while the tunneled transaction happens.

PIN information is also passed in real time to cash out device.

POS limit shimmed will not count against the ATM daily limit.

Page 19: HACKING NEXT-GEN ATMS

Shimmer VS Skimmer? Shimmers Found in Wild !

Page 20: HACKING NEXT-GEN ATMS

Cashout Device Standalone?

Confidential and Proprietary 20

Page 21: HACKING NEXT-GEN ATMS

21

Page 22: HACKING NEXT-GEN ATMS

Introducing La-CaraWhy would criminals automate cashout?

9People are un-trustable

9Cashout crews brag about it on social media

9Busted humans rat out their accomplices

9Machines don’t usually have twitter accounts.

9Defcon Theme this year is Rise of the machines

Page 23: HACKING NEXT-GEN ATMS

@LaCaraATM ATMs don’t have a twitter account ….

Page 24: HACKING NEXT-GEN ATMS

Making of La-Cara

That guy smiling like a child in the reflection

is me

Page 25: HACKING NEXT-GEN ATMS

25

Page 26: HACKING NEXT-GEN ATMS

Making of La-Cara

Page 27: HACKING NEXT-GEN ATMS

--

--

La-CaraSwiss army knife

Page 28: HACKING NEXT-GEN ATMS

Building your Own Banking Backend

Off branch ATM DES keys account signing

Each one of the accounts are signed with banking Keys

Each Card Transaction in Demo is Signed

Skimmer Generation is signed with

Field 55 training

Page 29: HACKING NEXT-GEN ATMS

EMV transaction

• Terminal POS/ATM

• Card/Device

• Acquirer• Bank Issuer

Step4 Step3

Step2Step1

Page 30: HACKING NEXT-GEN ATMS

EMV transaction

• Terminal POS/ATM

• Card/Device

• Acquirer• Bank Issuer

Step4 Step3

Step2Step1• Terminal

POS/ATM• Card/Device

• Acquirer• Bank Issuer

Step4 Step3

Step2Step1

Page 31: HACKING NEXT-GEN ATMS

Methods of Past Present:

Camera Method

PIN overlay

Unencrypted pin trace

We have the chip, how about the PIN?

Page 32: HACKING NEXT-GEN ATMS

OPEN CV

PIN radar

New Automating PIN Capture

Page 33: HACKING NEXT-GEN ATMS

Probing Networks and Card Settings

33

Estimating POS/ATM limits from a BIN number

What is a BIN?

POS vs ATM limit

Branch ATM vs off-network

Japanese ATMs

Chinese ATMs

Page 34: HACKING NEXT-GEN ATMS

Old Favorites Become New Favorites?

Shimming POS Systems

Habits of putting EMV card in early

Takes from POS limit on the in store transaction

ATM cash out is uninterrupted

Shimming bank front desk, Gas Pumps/Electric charge stations 2017+

Page 35: HACKING NEXT-GEN ATMS

Special Thanks to

9MY WIFE AND KIDS, JESUS, 9BARNABY JACK, SAMY KAMKAR,

9RUSSEL RYAN, ZACK ANDERSON AND ALESSANDRO CHIESA

9PHATPAT, ECONIC, TOTAL DOWNER9RANDOM PEOPLE IN CHATROOMS FORUMS

Page 36: HACKING NEXT-GEN ATMS

36

9$50,000 Prop money9So $500-$900 Per Transaction 9So at most 60 transactions9Transaction time for online is 18-22 seconds9Card Challenge Auth9Amount Selection Based on PAN/BIN9PIN entered /Downgraded when available9Money comes out !!!!9No receipt selected

Demo of Automation

Page 37: HACKING NEXT-GEN ATMS

Senior Security Consultant/Senior PentesterTWITTER @westonhecker

Rapid7

Weston Hecker

QUESTIONS?