Difference between revisions of "Tatanga attack exposes chipTAN weaknesses"

From Botnets.fr
Jump to navigation Jump to search
 
m (Text replacement - " www.trusteer.com" to "")
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{Publication
{{Publication
|Link=http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses www.trusteer.com
|Link=http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses
|Author=Amit Klein
|Author=Amit Klein
|NomRevue=Trusteer blog
|NomRevue=Trusteer blog

Latest revision as of 22:56, 5 August 2015

(Publication) Google search: [1]

Tatanga attack exposes chipTAN weaknesses
Botnet Tatanga
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-09-04
Editor/Conference Trusteer
Link http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses (Archive copy)
Author Amit Klein
Type

Abstract

We have discovered a new Tatanga attack against chipTAN systems used by banks in Germany to generate unique transaction authentication numbers (TAN). chipTAN requires that the bank card for the account be inserted in the device to generate a TAN that is specific to the current transaction.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1255,
   editor = {Trusteer},
   author = {Amit Klein},
   title = {Tatanga attack exposes chipTAN weaknesses},
   date = {04},
   month = Sep,
   year = {2012},
   howpublished = {\url{http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses}},
 }