Difference between revisions of "Tatanga attack exposes chipTAN weaknesses"
Jump to navigation
Jump to search
m (1 revision imported) |
Revision as of 16:29, 7 February 2015
(Publication) Google search: [1]
Tatanga attack exposes chipTAN weaknesses | |
---|---|
Botnet | Tatanga |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-04 |
Editor/Conference | Trusteer |
Link | http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses www.trusteer.com (www.trusteer.com Archive copy) |
Author | Amit Klein |
Type |
Abstract
“ We have discovered a new Tatanga attack against chipTAN systems used by banks in Germany to generate unique transaction authentication numbers (TAN). chipTAN requires that the bank card for the account be inserted in the device to generate a TAN that is specific to the current transaction.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1255, editor = {Trusteer}, author = {Amit Klein}, title = {Tatanga attack exposes chipTAN weaknesses}, date = {04}, month = Sep, year = {2012}, howpublished = {\url{http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses www.trusteer.com}}, }