Monday, November 18, 2024
HomeComputer SecurityDigital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Published on

Digital wallets enable users to securely store their financial information on smart devices and perform financial transactions without any hassle.

These wallets offer enhanced security compared to traditional payment methods, as these wallets encrypt payment data.

Since smartphone adoption has grown significantly, digital wallets are becoming increasingly popular for their convenience.

- Advertisement - SIEM as a Service

Cybersecurity analysts at Usenix recently discovered that digital wallets were bypassed to allow purchases with stolen cards.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Digital Wallets Bypassed

Vulnerabilities are introduced by decentralized authority delegation in the digital payment ecosystem.

Adding victims’ wallet bank cards to their own wallets, bypassing payment authorization with implicit trust between wallets and banks, and using different payment types to get round access controls.

Such security flaws in system design and trust relationships open up several possibilities for fraud and unauthorized acts.

Threat actors exploit vulnerabilities in payment systems by creating backdoors across various transaction types, circumventing established access control policies. 

This sophisticated attack enables unauthorized users to make purchases of any amount using victims’ bank cards, even when those cards have been reported stolen and locked by their owners. 

The severity of this exploit lies in its ability to override standard security protocols, potentially leading to significant financial losses for victims and undermining trust in banking systems.

Researchers have conducted a thorough study that confirms serious security lapses in major US financial institutions and digital payment platforms.

Researchers focused on discovering and testing vulnerabilities in big banks such as Chase, American Express, and Bank of America, as well as widely used e-wallet applications such as Apple Pay, Google Pay, and PayPal.

These discoveries show how risky the current fintech systems may be. Due to this, they have shared their findings with all affected persons following responsible disclosure practices.

Additionally, security analysts have designed and advocated for a number of specific mitigation plans aimed at addressing these security flaws.

While as a recommendation they urged users to not only seek to fix security flaws identified but also to strengthen the system from such potential attacks in the future which will result in increased financial safety for millions of users.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Acces

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...