How to steal money via Apple Pay using the “Express Transit” feature


A not-yet-published paper from researchers in the UK has been making media headlines because of its dramatic claims about Apple Pay.

Apple-centric publication 9to5Mac covered it with a headline that was almost a story in itself:

Apparent flaw allows hackers to steal money from a locked iPhone, when a Visa card is set up with Apple Pay Express Transit.

If you haven’t heard of Express Transit (known as Express Travel in the UK, where the word “transit” is not used to refer public transport), it’s one of those clever ideas that unavoidably trades off cybersecurity against convenience.

Simply put, it lets you complete some types of touch-to-pay transaction, even when your phone is locked.

You can tell where this is going.

(Express Transit is not enabled by default, so unless you have deliberately set it up on your device, the risks in this story don’t apply to you.)

Tin foil hats

Express Transit makes Apple Pay and your iPhone work a bit like a regular credit card, which doesn’t need unlocking with a PIN code for low-value transactions (in the UK, the limit is currently £45, or about $60).

Just tapping your credit card on or near a payment terminal – any terminal, whether it’s at a supermarket, in a newsagent, or at a coffee shop – triggers a rapid and entirely automated cryptographic exchange via the chip in your card that bills your account for the amount shown on the terminal’s screen.

The technology used in this process is known as NFC, short for near-field communication, which relies on a magnetic field emitted by the reader that generates a minusucle current via a metal coil looped inside the credit card.

That tiny burst of electrical energy produces just enough power to activate the chip for long enough to authorise a single transaction and transmit the verification data wirelessly back to the terminal.

In theory, anyone who has a payment terminal of their own, and a payment provider willing to process their dodgy transactions, could wave the terminal close enough to your credit or debit card, for example while you are waiting in a queue or jammed into a train or bus, and trick your card into making a payment you weren’t aware of.

Likewise, anyone who steals your card, even temporarily, could use it to approve a payment for their goods against your card, because they don’t need to know your PIN, merely to have your card in their hand for long enough to wave it at a legitimate terminal.

In practice, however, the use of bogus payment terminals to extract fradulent transactions by bringing the terminal to the card (rather than the other way around) seems to be extremely unusual.

So, for all the horror stories you may have heard about “payment leeches” prowling urban trains stealing money from unsuspecting commuters, we have never seen credible reports of successful, systematic frauds carried out this way.

We’re guessing that the stakes are simply too high for prospective crooks, given the obviously intrusive and anti-social behaviour required to pull off the occasional low-value fake transaction by rubbing up against total strangers on a crowded train.

Back in 2018, we tested several different types of credit card “shielding wallets”, from simple metal-coated cardboard covers, through to bulky metal card holders, and while we weren’t convinced you really needed to use one, we found that they all worked as advertised. Even our home-made shield hastily folded from tin foil (which is actually made of aluminium, of course) stopped our cards being activated, no matter how close we came to the reader or how many times we tried.

When “locked” means “sort of”

But what about NFC payment transations via your mobile phone?

Unlike your credit card, which you mostly keep in your wallet and only fish out when you are actually at a payment terminal, your phone is almost certainly often on public display, sometimes held in front of you, sometimes just sitting temptingly nearby on a desk, table or counter-top.

We’re much more likely to leave our phones in a bus, train, taxi, someone else’s office, shop, hotel or even at the beach than we are to lose our credit card in the same way.

It’s this “time exposed to danger” that persuades us to put lock codes on our mobile devices, so that they can’t instantly be used and abused by anyone who happens to pick them up and turn them on.

Even if we don’t like typing in a full-on lock code every time we want to use our devices throughout the day, most of us will configure some sort of alternative authentication mechanism such as fingerprint or facial recognition, to keep total strangers out.

Most of us also set a timeout period that locks our devices automatically after a few minutes, even if we forget to press the lock button before we put the device down.

Unfortunately, if rather obviously, every phone feature that you activate on the lock screen works directly against the security that the lock screen is supposed to provide in the first place.

Whether it’s allowing notifications and personal messages to appear while your phone is locked, or using the Apple Pay Express Transit feature to authorise tap-and-go payments while your phone is locked…

…anything that you authorise on the lock screen makes a bit of a mockery of the concept of “locking” your phone in the first place.

Speed is of the essence

Despite the risks, we understand the motivation behind Express Transit.

Public transport is often a crowded, high-pressure environment where the availability and convenience of tap-to-pay terminals has made your fellow commuters even less patient, and where fumbling with your unlock code or not getting your face recognised first time when you are in a crush at the ticketing machine or at the platform gate…

…can lead to delay, unpleasantness, insults, jostling, aggression or worse from the swarming multitudes around you.

Thus the selective Express Transit, also known as Express Travel, option in Apple Pay.

As we understand it, this “automatic unlock” doesn’t open up your account totally, so it doesn’t turn your phone into an instantly-pay-for-anything device like the credit card tucked up in your wallet.

The feature is only supposed to work with selected public transport services, so that (in the UK, for instance) you can make Express Transit payments at Transport for London terminals and to the First Group bus company, but no one else.

In the relaxed environment of your favourite Camden Town coffee shop, you’ll still need to unlock your phone to make a payment, but in the rush hour squish at Mornington Crescent underground railway station, you won’t.

What’s the deal?

As explained above, enabling Express Transit doesn’t, in theory, open up your locked phone to abuse while you are wandering through a department store, for example, or going to a movie, or paying for fuel at a service station.

In practice, however, the researchers behind this yet-to-be-published paper claim thay they were able to trick iPhones into making fraudulent payments under carefully prepared circumstances, by setting up their own payment terminal and passing it off as belonging to a public transport company that was part of the Express Transit payment scheme.

Apparently, they only managed to pull this off with Visa card accounts (presumably, other payment providers were stricter about deciding whether payment terminal X really belonged to company Y), but it wasn’t limited by the usual NFC credit card payment limit.

Indeed, the researchers claim that by using a fraudulent payment terminal they could get transactions approved up to £1000, well beyond the £45 tap-and-pay limit that currently applies to regular credit cards in the UK.

What to do?

Should you be worried?

We don’t think so, but that’s because we avoid all “make things work at the lockscreen” features on all our mobile devices.

We have embraced the minor irritation of having to type in our (long!) lock code every time we want to use our phone to do anything more than check the time.

We’ve worked the it-only-takes-a-few-seconds unlock process into the way we conduct our digital lifestyle, even if that occasionally means standing aside from a quickly moving queue for a few moments to get our phone ready to use at the pinch point.

So, in this case, our recommendations are as follows:

  • Avoid Express Transit and any other “active on the lockscreen” features if you can. These options unavoidably sacrifice cybersecurity for convenience. Practise unlocking your phone so you’re comfortable doing it regularly, and you may find that you can do without Express Transit altogether.
  • Avoid using Visa cards with Express Transit if you are worried. To be fair to Visa, we’re assuming that, with enough effort, similar bypass tricks could be found to target other payment providers. So, merely avoiding Visa can be considered “security through obscurity”. But these researchers have apparently already found a way to bypass Visa’s checks, so you might as well defend against what seems to be the known part of the problem so far. If you’re really worried, and you simply can’t live without Express Transit, consider setting it up with a prepaid debit card, and keeping a modest balance that you spend only on public transport.
  • Don’t leave your phone unattended if you can avoid it. Try treating your phone a bit more like your credit card, which you almost certainly don’t get out unless you need it, and put away once you’ve finished with it. If you like to have your phone handy at all times, keep it close (and, ideally, keep it in your hand).
  • Set the longest lock code and the shortest auto-lock timeout you can tolerate. A locked phone is a minor inconvenience for you, but a major barrier against crooks, even technically knowledgeable ones. An unlocked phone, on the other hand, is an open target for anyone, including unsophisticated, opportunist criminals.
  • Check your bank and payment card statements regularly. If you use Express Transit for regular and predictable commuting payments, you should be able to spot any anomalous debits fairly easily, because they probably won’t fit your regular pattern.

Products You May Like

Articles You May Like

Microsoft Admits Security Failings Allowed China to Access US Government Emails
How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe
U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
Google’s Privacy Sandbox Accused of User Tracking by Austrian Non-Profit
WithSecure Reveals Mass Exploitation of Edge Software and Infrastructure Appliances

Leave a Reply

Your email address will not be published. Required fields are marked *