Tuesday, April 22, 2025
HomeCyber Security NewsBeware !! Square & PayPal Mobile Point of Sales (POS) Devices Are...

Beware !! Square & PayPal Mobile Point of Sales (POS) Devices Are Extremely Vulnerable to Credit/Debit Card Data Theft

Published on

SIEM as a Service

Follow Us on Google News

Well known and popular card readers also known as POS devices that using in POS terminals are open to multiple critical attack vectors that put credit/debit card at high risk to steal the card data.

Two Security researchers Leigh-Anne Galloway & Timur Yunusov take the project that involved to analyze across the US and Europ using seven card readers in that belongs to different vendors such as iZettle, PayPal, Square.

They uncovered that more than half of the Mobile Point of Sales terminals are vulnerable to some form of attack and they identified 2 terminals could allow to sending of arbitrary commands by attackers.

- Advertisement - Google News

Once attackers exploit the vulnerabilities then it provides full access to the terminals operating system that leads an attacker to enable plain text mode from encrypted Transaction to collect the PIN from Victims.

Attack vectors are using social engineering techniques to force a cardholder to use a less secure method of payment, such as mag-stripe.

Another method that is used to display a “Payment declined” message in order to make the cardholder to carry out additional transactions.

According to Researchers, We identified five terminals that are vulnerable to amount modification for mag-stripe transactions. also, you can see their Video presentation at DEFCON conference.

“This vulnerability can be used by a fraudulent merchant to force a cardholder to approve a much higher value amount. During the transaction, the merchant displays a different, lower amount on the card reader, and another higher amount is sent to the Mobile Point of Sales provider for approval.”

The team also found that it’s possible to carry out a man-in-the-middle attack using this Bluetooth access to intercept the HTTPS traffic between the mobile application and the payment server due to the vulnerabilities that exist in the five terminals.

You can also see the full white paper and slides presentation regarding this whole research.

Also Read:

Natural Disaster Related Phishing Scam Abusing Microsoft Azure to Steal login Credentials & Credit Card Numbers

Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...