Wednesday, May 14, 2025
HomeCyber Security NewsBeware !! Square & PayPal Mobile Point of Sales (POS) Devices Are...

Beware !! Square & PayPal Mobile Point of Sales (POS) Devices Are Extremely Vulnerable to Credit/Debit Card Data Theft

Published on

SIEM as a Service

Follow Us on Google News

Well known and popular card readers also known as POS devices that using in POS terminals are open to multiple critical attack vectors that put credit/debit card at high risk to steal the card data.

Two Security researchers Leigh-Anne Galloway & Timur Yunusov take the project that involved to analyze across the US and Europ using seven card readers in that belongs to different vendors such as iZettle, PayPal, Square.

They uncovered that more than half of the Mobile Point of Sales terminals are vulnerable to some form of attack and they identified 2 terminals could allow to sending of arbitrary commands by attackers.

- Advertisement - Google News

Once attackers exploit the vulnerabilities then it provides full access to the terminals operating system that leads an attacker to enable plain text mode from encrypted Transaction to collect the PIN from Victims.

Attack vectors are using social engineering techniques to force a cardholder to use a less secure method of payment, such as mag-stripe.

Another method that is used to display a “Payment declined” message in order to make the cardholder to carry out additional transactions.

According to Researchers, We identified five terminals that are vulnerable to amount modification for mag-stripe transactions. also, you can see their Video presentation at DEFCON conference.

“This vulnerability can be used by a fraudulent merchant to force a cardholder to approve a much higher value amount. During the transaction, the merchant displays a different, lower amount on the card reader, and another higher amount is sent to the Mobile Point of Sales provider for approval.”

The team also found that it’s possible to carry out a man-in-the-middle attack using this Bluetooth access to intercept the HTTPS traffic between the mobile application and the payment server due to the vulnerabilities that exist in the five terminals.

You can also see the full white paper and slides presentation regarding this whole research.

Also Read:

Natural Disaster Related Phishing Scam Abusing Microsoft Azure to Steal login Credentials & Credit Card Numbers

Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...