Get a Pentest and security assessment of your IT network.

Cyber Security

EMV Card Wedge Attacks: Current Status

TL;DR

Wedge attacks are still possible, but significantly harder than in the early days of EMV. Modern cards and terminals have many protections. Successful attacks require specialist equipment, physical access to both card and terminal, and a good understanding of how EMV works. They are generally not a threat to everyday users, but remain a concern for high-value targets or poorly secured systems.

What is a Wedge Attack?

A wedge attack involves intercepting the communication between an EMV chip card and a payment terminal. The attacker uses a device – the ‘wedge’ – to sit in between, relaying data while potentially manipulating it. The goal is usually to force the terminal to process the transaction using the magnetic stripe data instead of the more secure chip, bypassing security features.

Why Were Wedge Attacks Possible?

Early EMV implementations often fell back to magnetic stripe processing if the chip communication failed or timed out. This fallback was a vulnerability; magnetic stripes are easily cloned. The wedge exploited this by causing communication errors, forcing the fallback.

Current Status: Why It’s Harder Now

  1. Improved Fallback Mechanisms: Most modern terminals are configured to minimise or eliminate magnetic stripe fallback. They will often require PIN entry even if a chip read fails.
  2. Terminal Hardware Protections: Many newer terminals have tamper detection and physical security measures making wedge insertion difficult without alerting staff or damaging the device.
  3. Card Protections: Modern EMV cards include features to detect abnormal communication patterns, potentially locking themselves down if a wedge is detected.
  4. Online PIN Verification: Increasingly, terminals perform online PIN verification (rather than offline), making it harder for attackers to use stolen PINs with intercepted card data.
  5. Dynamic CVV/CVC: Some cards now generate a dynamic Card Verification Value (CVV/CVC) for each transaction, rendering static values useless.

How an Attack Might Still Work (Technical Details)

While difficult, attacks are still possible in specific scenarios:

  1. Intercepting Communication: The attacker needs a wedge device capable of reading and relaying EMV communication. These devices can range from simple readers to sophisticated systems that mimic terminal behaviour.
  2. Causing Chip Read Failure: The wedge attempts to disrupt the chip read process, often by introducing noise or timing errors into the communication.
  3. Relaying Data & Forcing Fallback: The wedge relays the card data (potentially modified) and attempts to force the terminal to use magnetic stripe processing. This might involve manipulating the ISO 7816 protocol messages. A simplified example of a potential message manipulation attempt (this is illustrative only, actual attacks are far more complex):
    # Example: Attempting to alter the Application Protocol Identifier
    # (This is not functional code - it shows the concept)
    APDU_command = "00A4040007A0000000781600"
    modified_APDU = APDU_command.replace("07", "09") # Attempt to change protocol
    # Send modified_APDU to the terminal via the wedge interface
  4. Capturing Transaction Data: The attacker captures the transaction data (including PAN, expiry date, and potentially PIN if not securely handled).
  5. Cloning/Using the Data: The captured data is used to create a cloned card or for fraudulent online purchases.

Mitigation Steps

  • Regular Terminal Updates: Ensure payment terminals have the latest firmware and security patches applied.
  • Disable Magnetic Stripe Processing (Where Possible): Configure terminals to minimise or eliminate magnetic stripe fallback.
  • Physical Security: Protect terminals from tampering and unauthorized access. Use secure enclosures and monitor for suspicious activity.
  • Employee Training: Train staff to identify and report potential fraud attempts.
  • Transaction Monitoring: Implement robust transaction monitoring systems to detect unusual patterns of activity.
  • End-to-End Encryption: Use point-to-point encryption (P2PE) to protect card data during transmission.

Resources

  • EMVCo Website: https://www.emvco.com (Official EMV standards body)
  • NIST Special Publication 800-97: Provides guidance on secure card data handling.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation