Sunday, August 17, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

New study reveals loophole in digital wallet security—even if rightful cardholder doesn’t use a digital wallet

August 14, 2024
in Technology and Engineering
Reading Time: 4 mins read
0
Digital wallet environment
66
SHARES
603
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT
ADVERTISEMENT

Digital wallets — like Apple Pay, Google Pay and PayPal — are projected to be used by more than 5.3 billion people by 2026. While these wallets promote increased security over traditional payment methods, reliance on outdated authentication methods and prioritizing convenience over security leaves digital wallets vulnerable, according to new research led by computer engineers at the University of Massachusetts Amherst. 

Digital wallet environment

Credit: Raja Hasnain Anwar, UMass Amherst

Digital wallets — like Apple Pay, Google Pay and PayPal — are projected to be used by more than 5.3 billion people by 2026. While these wallets promote increased security over traditional payment methods, reliance on outdated authentication methods and prioritizing convenience over security leaves digital wallets vulnerable, according to new research led by computer engineers at the University of Massachusetts Amherst. 

“What we have discovered is [that] these digital wallets are not secure,” says Taqi Raza, assistant professor of electrical and computer engineering and an author on the paper. “The main reason is that they have unconditional trust between the cardholder, the wallet and the bank.” 

In the normal digital wallet ecosystem, users start by inputting their credit or debit card number, called the primary account number (PAN), into the digital wallet. The user’s identity is authenticated as the rightful cardholder with a piece of information, such as a zip code or the last four digits of their social security number. Then, whenever a purchase is made, the wallet hides the PAN and shares a “token” with the vendor. The vendor attaches the token to the transaction. This information goes back through the bank’s payment network, converting the token back to the PAN. The bank then settles the payment with the vendor on behalf of the customer without ever revealing the PAN to the vendor. 

Unfortunately, there are ways that bad actors can circumnavigate this system to make purchases with other people’s credit cards. The major U.S. banks and digital wallet companies impacted by this are described in the paper. These companies were informed of the study findings prior to its publication and given ample time to make necessary security improvements. The researchers used their own cards to complete their tests and no fraudulent activity was performed in these security tests. 

First, there is the issue of the initial authentication. “Any malicious actor who knows the [physical] card number can pretend to be the cardholder,” says Raza. “The digital wallet does not have sufficient mechanism to authenticate whether the card user is the cardholder or not.” He emphasizes that existing authentication methods can easily be bypassed. 

Another issue is that, once a victim reports their card stolen, the banks only block transactions from a physical card, not ones made through a digital wallet. Banks assume that their authentication system has sufficient security to prevent attackers from adding someone else’s card to their wallet, which, as Raza points out, is not the case.  

Once stolen card numbers are saved in a digital wallet, it is virtually impossible for the cardholder to deactivate them. “Even if the cardholder requests a card replacement, banks do not re-authenticate the cards stored in the wallet,” says Raza. “What they do is they simply change the virtual number mapping to the new physical card number.”  

Here is a fictional example: The victim’s credit card number ends in 0123. An attacker adds 0123 to their digital wallet and starts making purchases. Again, digital wallets work by sending a virtual number to the vendor, so vendors receive the virtual number ABCD and take this number to the bank to get payment associated with account 0123.  

The victim discovers the fraudulent payments and asks the bank to issue a new credit card. The bank sends a new card with the number 4567 and, on the back end, remaps the virtual number: ABCD no longer links to 0123, it now links to 4567. The wallet automatically starts showing the new card to its user without any verification for the new card to be updated in the wallet. Vendors then go to the bank with ABCD, which has now been linked to 4567, the new and active number, and the purchase goes through. 

The researchers also tested this loophole on the digital wallet side of the equation and found similar vulnerabilities. “We want [the digital wallet companies] to take some responsibility as well because they are at the forefront of how these transactions happen,” says Raja Hasnain Anwar, a doctoral candidate in electrical and computer engineering and lead study author. “We want them to have solid coordination. That’s the whole point of the paper: there’s not. There’s a lack of coordination.” 

He highlights that many of these issues stem from new features offered by the banks. “For example, you could share your card within a family — one card could be added to multiple mobile phones,” he says. “Or if you have a Netflix subscription, the credit card company doesn’t want you to lose that subscription, so they will keep on charging your card, even though that card is locked. If the banks are trying to move all of their payment platforms digitally, they need to put in more effort to make that secure. They cannot just rely on existing technology to take care of it.”  
“It’s security versus convenience,” adds Raza. “And we found the banks give more priority to convenience than security. Security is taken for granted because they believe that the user-device verification being used is sufficient for wallet security. It’s not.” 

While this specific loophole has been resolved, researchers still recommend following security best practices: turn on email notifications when a card is added/removed from the wallet, turn on transaction alerts for credit cards, regularly check credit card statements and review devices linked to credit cards through the bank’s web portal or mobile app account settings. 

This work was done by researchers at UMass Khwarizmi Lab led by Raza. 



Method of Research

Computational simulation/modeling

Subject of Research

Not applicable

Article Title

In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping

Article Publication Date

14-Aug-2024

Share26Tweet17
Previous Post

iFAB Tech Hub grows net-zero industrial chemical partnerships, champions bioeconomy

Next Post

Ke Fan and Daniel Nichols named recipients of 2024 ACM-IEEE CS George Michael Memorial HPC Fellowships

Related Posts

blank
Technology and Engineering

Seismic Analysis of Masonry Facades via Imaging

August 16, 2025
blank
Technology and Engineering

Pediatric Pharmacogenomics: Preferences Revealed by Choice Study

August 16, 2025
blank
Technology and Engineering

Real-Time Water Monitoring in Aqueducts via Acoustic Sensing

August 16, 2025
blank
Technology and Engineering

Neonatal Cord Metabolome Links to Teen Heart Health

August 16, 2025
blank
Technology and Engineering

Unraveling Ion Transport in LISICON Structures

August 16, 2025
blank
Technology and Engineering

Enhancing Rheology of Silicon Nitride Resins for 3D Printing

August 16, 2025
Next Post
Ke Fan and Daniel Nichols Named Recipients of 2024 ACM-IEEE CS George Michael Memorial HPC Fellowships

Ke Fan and Daniel Nichols named recipients of 2024 ACM-IEEE CS George Michael Memorial HPC Fellowships

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27535 shares
    Share 11011 Tweet 6882
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    948 shares
    Share 379 Tweet 237
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    507 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    311 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Psychological Flexibility Shapes Lasting Effects of Childhood Trauma
  • New Metabolic Inflammation Model Explains Teen Reproductive Issues
  • Compulsive Shopping, Family, and Fashion in Female Students
  • Mpox Virus Impact in SIVmac239-Infected Macaques

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,859 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading