Sign up to our newsletter
You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. Many folks in the US in particular are unfamiliar with this technology, and many more of us are only familiar with it as a source of frustration when traveling abroad. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.
The magnetic stripe technology that we are all so familiar with on the back of our credit cards has been around for over 40 years now. The first iterations were much like the tape used by audiocassettes, in that they contained data that was recorded in variations within a coating of iron oxide (also known as rust, for those of us not conversant in chemistry terms) on plastic strips. Those strips were affixed to cards, which could then be swiped by readers that were able to retrieve the data. Since the beginning, little has changed in the technology behind these cards, and there is very little built in to protect these cards against fraudulent usage.
At about the same time magnetic stripe cards were first being introduced, the first patents for chip cards were being filed. But it was not until the early 1990s that these cards were widely used for credit and debit card purposes. The three companies that joined together to do this were Europay, MasterCard and Visa, which is what gives us the name EMV. Rather than storing data on a magnetic stripe, these cards have data on a chip that is affixed to the card. In many countries in the world, this is now the default credit card technology, and payment systems with magnetic stripe readers are becoming increasingly rare.
Chip cards are so named because they have a small microprocessor affixed to them, which acts like a small computer. Data on the chip are accessed interactively, and the chip requires specific, expected responses from a card reader in order to reveal its information. This makes cloning of cards significantly more difficult and costly for criminals.
The specifics of cards using chips can vary quite a bit. In many cases, the card is “Chip & PIN” which means that the payment process involves reading bank and identity information from the chip, and then the customers must enter their PINs to authenticate their identities. This means that customers are providing two factors of authentication – something the customer has (the card) and something the customer knows (the PIN).
Physically, the purchase process would feel very familiar to debit card users in the US, except that the card is “dipped” into the reader rather than being “swiped”. (A very slight difference, except when you have an older card that resists being read as the strip has mostly been rubbed away!)
In other cases, a sort of hybrid technology is used, which can be more similar to the traditional “Swipe & Sign” cards. Cards may have a magnetic stripe so that they can be “swiped” for purchases in countries like the US that have not yet migrated to the newer technology. And in some cases there may not be the requirement to use a PIN, and these cards are called “Chip & Signature” cards.
As readers of this blog may be painful aware, the longer any technology remains unchanged, the more opportunity criminals will have to break any security around that technology. This is precisely what we have seen with the “Swipe & Sign” cards in the US. Criminals have had four decades to understand and learn to steal this information, which leads to a significant amount of fraud. In the case of the recent Target breach, this meant using RAM-scraper malware that lay in wait on Point of Sale (POS) machines, for credit and debit card data to be in memory, so that it could gather and distribute that information to the malware’s controller.
This RAM-scraping tactic meant that even if retailers encrypted the data on disk and as the information went across the Internet, it was not protected. This sort of scenario is an inevitable consequence of the use of encryption – when the data are in use, as in the case of viewing or verifying data, the information is temporarily unprotected. Using strong encryption significantly decreases the time during which data are at risk, but many attackers now use malware designed to wait for that very brief window to be opened.
The use of EMV cards would not necessarily have protected against an attack using RAM-scraper malware, because not all financial transactions require the presence of a physical credit card. But not having a physical card severely limits its utility to criminals. It is possible to impersonate physical Chip & PIN cards so they can be used more widely, and while this is both difficult and imperfect, the tactic has already been used by criminals for years. While EMV technology has the potential to decrease card fraud, it is not a panacea.
The majority of fraud cases in countries using Chip & Pin cards are “card not present” transactions, such as online purchases, where the chip cannot be used for verification. Businesses in Canada have found a way to combat this, which requires cardholders to log into their bank account rather than provide financial information directly to the merchant.
As we can see in the case of the Canadian restrictions, how businesses implement EMV makes a big difference in how well the technology is able to reduce fraud. This is one specific area of concern, when it comes to the way EMV is likely to be adopted in the US. Ideally:
In the US, what is being proposed is:
As you can see, this scenario is significantly less secure than is ideal. While this will improve card safety to some degree, it will be a fairly minimal improvement that leaves the US lagging behind most of the world. And businesses should be aware that failing to move towards the use of chip readers would mean they are on the hook for more of the liability for fraudulent purchases.
In all things relating to security and privacy, the goal is to make accessing our data prohibitively expensive or difficult for our adversaries. And in this way, switching away from Swipe & Sign cards is a step in the right direction. But we should not expect this change to end credit card fraud. Hopefully moving towards Chip & PIN cards is simply a first step in moving towards greater security measures for credit card transactions – one that allows merchants to make the necessary changes at a less-painful pace.
Author Lysa Myers, ESET