RFID skimming

Last updated

RFID skimming is a method to unlawfully obtain someone's payment card information using a RFID reading device.

Contents

How RFID skimming is performed

Modern payment cards have a built in chip that transmits card information wirelessly. This is because it is necessary in order to enable contactless payments, which has become increasingly popular during recent years. [1] Criminals can take advantage of this new technology by using a scanner that wirelessly scans the victim's payment card in the same way that a cash register scans it, when making a contactless payment. These scanners are legal and can be bought in regular electronics stores.

Most modern mobile telephones running Android OS have a built in NFC reader that can be used to unlawfully scan contactless payment cards. A criminal can hide the scanner e.g. inside a glove or a bag, and then place it close to the victim and wirelessly steal the victim's payment card information. [2]

With the wirelessly obtained payment card information, the criminal can use it to make fraudulent purchases online.[ citation needed ] This is called card-not-present fraud.

Methods similar to RFID payment card skimming may also be used for copying other RFID-based proximity cards, such as those used for keycard locks. 125 kHz RFID and other systems relying on a unique identifier number (UID) are vulnerable to this. [3] [4]

Incidence

Card-not-present fraud increased rapidly between 2012 and 2016. [5] In the United Kingdom an increase could be seen in card not present fraud - from 750,200 reported cases in 2012, to 1,437,832 reported cases in 2016. [6] However, there are no statistics available regarding RFID skimming, as it is difficult to determine the method of card fraud. [7]

RFID skimming compared to other types of skimming

In contrast to other types of skimming such as ATM skimming or hacking an online merchant web page, RFID skimming requires little or no technical expertise. In order to execute ATM skimming, the criminal needs to custom build a device, then place that device inside an ATM and later pick up the device after the victims have used it. Hacking online merchant web pages requires substantial computer knowledge.[ citation needed ]

Myths

A common myth that is often mentioned by card issuers is that a criminal can only steal the maximum amount that is allowed for contactless purchases. This mythical sum is usually between US$30–50 and is different for each country. This has been proven wrong in a test by British consumer magazine Which? . In the test they successfully used wirelessly obtained payment card information to make an online purchase of more than £ 3,000. [2]

Methods for preventing RFID skimming

Metal foil

Shielding is possible by wrapping the payment card in aluminum foil. However aluminium foil tends to wear out quickly. Informal tests found that the shielding effect was not 100% effective, although the foil did very much reduce the maximum range for reading, from about 1.5 feet (50 cm) to 1–2 inches (3–5 cm). [8]

Permanent disabling of RFID functionality

According to informal reports, RFID functionality can be disabled permanently by cutting internal wires and the use of a microwave oven has also been reported successful. [9] Cutting requires location of the internal wires, followed by cutting, drilling, or heating. Methods that visibly damage the card may lead to it being rejected as a payment method when presented to a retailer in the normal way.

RFID Blocking materials

There are RFID-blocking wallets, purses, sleeves, and cards. Wallets, purses, and sleeves work by acting as a Faraday cage that creates a screen around contactless cards, which stops electromagnetic fields interacting with the cards. [10]

RFID Blocking-Scrambling Cards

An RFID Blocking Card is an RFID-blocking device that operates without a battery by receiving the RFID signal from a card reader or skimmer and it scrambles the RFID signal making it unreadable by any device. Most RFID Wallets try to stop the electromagnetic fields interacting with RFID cards whereas RFID Blocking cards use 'Active Jamming Technology' to interrupt the communication. [11]

Related Research Articles

<span class="mw-page-title-main">EFTPOS</span> Type of electronic payment system

Electronic funds transfer at point of sale is an electronic payment system involving electronic funds transfers based on the use of payment cards, such as debit or credit cards, at payment terminals located at points of sale. EFTPOS technology was developed during the 1980s.

<span class="mw-page-title-main">Mobile payment</span> Payment services via a mobile device

A mobile payment, also referred to as mobile money, mobile money transfer and mobile wallet, is any of various payment processing services operated under financial regulations and performed from or via a mobile device, as the cardinal class of digital wallet. Instead of paying with cash, cheque, or credit cards, a consumer can use a payment app on a mobile device to pay for a wide range of services and digital or hard goods. Although the concept of using non-coin-based currency systems has a long history, it is only in the 21st century that the technology to support such systems has become widely available.

<span class="mw-page-title-main">Near-field communication</span> Radio communication established between devices by bringing them into proximity

Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 cm (1.57 in) or less. NFC offers a low-speed connection through a simple setup that can be used to bootstrap more capable wireless connections. Like other "proximity card" technologies, NFC is based on inductive coupling between two antennas present on NFC-enabled devices—for example a smartphone and a printer—communicating in one or both directions, using a frequency of 13.56 MHz in the globally available unlicensed radio frequency ISM band using the ISO/IEC 18000-3 air interface standard at data rates ranging from 106 to 848 kbit/s.

<span class="mw-page-title-main">EMV</span> Smart payment card standard

EMV is a payment method based on a technical standard for smart payment cards and for payment terminals and automated teller machines which can accept them. EMV stands for "Europay, Mastercard, and Visa", the three companies that created the standard.

<span class="mw-page-title-main">EZ-Link</span> Contactless smart card used in Singapore

The EZ-Link card is a rechargeable contactless smart card and electronic money system that is primarily used as a payment method for public transport such as bus and rail lines in Singapore. A standard EZ-Link card is a credit-card-sized stored-value contact-less smart-card that comes in a variety of colours, as well as limited edition designs. It is sold by TransitLink Pte Ltd, a subsidiary of the Land Transport Authority (LTA), and can be used on travel modes across Singapore, including the Mass Rapid Transit (MRT), the Light Rail Transit (LRT), public buses which are operated by SBS Transit, SMRT Buses, Tower Transit Singapore and Go-Ahead Singapore, as well as the Sentosa Express.

FeliCa is a contactless RFID smart card system from Sony in Japan, primarily used in electronic money cards. The name stands for Felicity Card. First utilized in the Octopus card system in Hong Kong, the technology is used in a variety of cards also in countries such as Singapore, Japan, Indonesia, Macau, the Philippines and the United States.

<span class="mw-page-title-main">Lebanese loop</span> Fraud device used on ATMs

A Lebanese loop is a device used to commit fraud and identity theft by exploiting automated teller machines (ATMs). In its simplest form, it is a strip or sleeve of metal or plastic which blocks the ATM's card slot, causing any inserted card to be apparently retained by the machine, allowing it to be retrieved by the fraudster when the card holder leaves.

<span class="mw-page-title-main">Payment card</span> Card issued by a financial institution that can be used to make a payment

Payment cards are part of a payment system issued by financial institutions, such as a bank, to a customer that enables its owner to access the funds in the customer's designated bank accounts, or through a credit account and make payments by electronic transfer with a payment terminal and access automated teller machines (ATMs). Such cards are known by a variety of names including bank cards, ATM cards, client cards, key cards or cash cards.

A card reader is a data input device that reads data from a card-shaped storage medium. The first were punched card readers, which read the paper or cardboard punched cards that were used during the first several decades of the computer industry to store information and programs for computer systems. Modern card readers are electronic devices that can read plastic cards embedded with either a barcode, magnetic strip, computer chip or another storage medium.


A contactless smart card is a contactless credential whose dimensions are credit card size. Its embedded integrated circuits can store data and communicate with a terminal via NFC. Commonplace uses include transit tickets, bank cards and passports.

<span class="mw-page-title-main">NETS (company)</span>

Network for Electronic Transfers, colloquially known as NETS, is a Singaporean electronic payment service provider. Founded in 1986 by a consortium of local banks, it aims to establish the debit network and drive the adoption of electronic payments in Singapore. It is owned by DBS Bank, OCBC Bank and United Overseas Bank (UOB).

<span class="mw-page-title-main">Contactless payment</span> Technology enabling payment without physical contact

Contactless payment systems are credit cards and debit cards, key fobs, smart cards, or other devices, including smartphones and other mobile devices, that use radio-frequency identification (RFID) or near-field communication for making secure payments. The embedded integrated circuit chip and antenna enable consumers to wave their card, fob, or handheld device over a reader at the Point-of-sale terminal. Contactless payments are made in close physical proximity, unlike other types of mobile payments which use broad-area cellular or WiFi networks and do not involve close physical proximity.

<span class="mw-page-title-main">Payment terminal</span> Device for electronic fund transfers

A payment terminal, also known as a point of sale (POS) terminal, credit card machine, PIN pad, EFTPOS terminal, is a device which interfaces with payment cards to make electronic funds transfers. The terminal typically consists of a secure keypad for entering PIN, a screen, a means of capturing information from payments cards and a network connection to access the payment network for authorization.

<span class="mw-page-title-main">Credit card fraud</span> Financial crime

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help financial institutions process card payments securely and reduce card fraud.

Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless mechanics." Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon. According to Marc Rotenberg of the Electronic Privacy Information Center, wireless identity theft is a serious issue as the contactless (wireless) card design is inherently flawed, increasing the vulnerability to attacks.

A payment processor is a system that enables financial transactions, commonly employed by a merchant, to handle transactions with customers from various channels such as credit cards and debit cards or bank accounts. They are usually broken down into two types: front-end and back-end.

<span class="mw-page-title-main">Apple Wallet</span> Digital wallet platform by Apple

Apple Wallet is a digital wallet developed by Apple Inc. and included with iOS and watchOS that allows users to store Wallet passes such as coupons, boarding passes, student ID cards, government ID cards, business credentials, resort passes, car keys, home keys, event tickets, public transportation passes, store cards, and – starting with iOS 8.1 – credit cards, and debit cards for use via Apple Pay.

<span class="mw-page-title-main">LG Pay</span> Mobile payment service

LG Pay was a mobile payment and digital wallet service by LG Electronics that let users make payments using compatible phones. The service supported contactless payments using near-field communication (NFC), and also incorporated wireless magnetic communication that allowed contactless payments to be used on payment terminals that only supported magnetic stripe transactions.

<span class="mw-page-title-main">Google Pay (payment method)</span> Mobile payments platform developed by Google

Google Pay is a mobile payment service developed by Google to power in-app, online, and in-person contactless purchases on mobile devices, enabling users to make payments with Android phones, tablets, or watches. Users can authenticate via a PIN, passcode, or biometrics such as 3D face scanning or fingerprint recognition.

Square is a financial services platform developed by Block, Inc. It is aimed at small-and medium-sized businesses, allowing them to accept credit card payments and use phones or tablets as payment registers for a point-of-sale system.

References

  1. "1 billion Visa contactless purchases made in last year". www.visaeurope.com. Retrieved 2019-01-06.
  2. 1 2 Bachelor, Lisa (2015-07-23). "Contactless card fraud is too easy, says Which?". The Guardian. ISSN   0261-3077 . Retrieved 2019-01-06.
  3. Maxsenti, Mike (23 May 2017). "How to Clone an RFID Key Card for Less Than $11 – And How to Defend Against It". Genea.
  4. Mehl, Bernhard. "Step-by-Step: How to Copy RFID and NFC Access Cards & Key Fobs". www.getkisi.com.
  5. PYMNTS (2017-01-18). "Card-Not-Present Fraud Picking Up In U.S." PYMNTS.com. Retrieved 2019-01-06.
  6. "Financial Fraud Action UK - Fraud the Facts". www.financialfraudaction.org.uk. Retrieved 2019-01-06.
  7. "What is RFID Blocking (and Why You Don't Really Need It)". FinanceBuzz. November 7, 2019.
  8. "Aluminum Foil Does Not Stop RFID". Omniscience is Bliss.
  9. NTT (2013-09-15). "How to Disable 'Contactless Payment' on Your Debit Card". instructables circuits. Retrieved 2020-02-10.
  10. Miczulski, Matt (7 November 2019). "What is RFID Blocking (and Why You Don't Really Need It)". FinanceBuzz.
  11. Kingsley-Hughes, Adrian (20 February 2023). "Testing RFID blocking cards: Do they work? Do you need one?)". ZDNET.