Tatanga attack exposes chipTAN weaknesses
(Publication) Google search: [1]
Tatanga attack exposes chipTAN weaknesses | |
---|---|
Botnet | Tatanga |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-09-04 |
Editor/Conference | Trusteer |
Link | http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses www.trusteer.com (www.trusteer.com Archive copy) |
Author | Amit Klein |
Type |
Abstract
“ We have discovered a new Tatanga attack against chipTAN systems used by banks in Germany to generate unique transaction authentication numbers (TAN). chipTAN requires that the bank card for the account be inserted in the device to generate a TAN that is specific to the current transaction.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1255, editor = {Trusteer}, author = {Amit Klein}, title = {Tatanga attack exposes chipTAN weaknesses}, date = {04}, month = Sep, year = {2012}, howpublished = {\url{http://www.trusteer.com/blog/tatanga-attack-exposes-chiptan-weaknesses www.trusteer.com}}, }