cheap nfl jerseys china cheap nfl jerseys free shipping wholesale nfl jerseys china wholesale jerseys from china cheap nfl jerseys free shipping cheap nfl jerseys for sale cheap jerseys free shipping wholesale nfl jerseys from china cheap nfl jerseys sale cheap nike nfl jerseys china wholesale jerseys free shipping cheap nfl jerseys wholesale wholesale nfl jerseys online cheap nfl jerseys wholesale china jerseys wholesale cheap coach handbags outlet authentic designer handbags cheap coach handbags outlet cheap coach purses outlet discount coach bags coach bags sale coach purse outlet cheap real coach purses coach handbags sale online coach purse outlet michael kors outlet online store cheap michael kors bags cheap michael kors purse michael kors factory outlet online cheap michael kors handbags cheap michael kors purses michael kors bags outlet online cheap michael kors purse michael kors handbags discount

One does not require the device to be ‘jailbroken’

Mandalay Bay, Las Vegas and London, UK – July 27, 2017:  In a session at Blackhat USA 2017, a senior researcher for Positive Technologies will demonstrate two separate attacks that can be performed against ApplePay, highlighting weaknesses in the payment method. While one will require a jailbroken device, the other does not.

In one attack, hackers will need to first infect a jailbroken device with malware. Having done so, they are then able to intercept traffic as it is transferred to the Apple server, in this case payment data being added to the device’s account.

The second attack can be performed against any device as hackers intercept and/or manipulate SSL transaction traffic without employing any sophisticated equipment or skills. Doing so allows them to replay or tamper with transaction data: change the amount or currency being paid, or change the delivery details for the goods being ordered.

Timur Yunusov, Head of Banking Security for Positive Technologies explains, “With wireless payments – PayPass, ApplePay, SamsungPay, etc., there is a perception that ApplePay is one of the most secure systems. ApplePay’s security measures mean that it has a separate microprocessor for payments [Secure Enclave], card data is not stored on the device nor is it transmitted in plaintext during payments. On paper this appears to be the perfect defence. However, the devil is in the detail! During testing, I have discovered at least two methods that render these precautions worthless. While one relies on the device being jailbroken, which is estimated at 20%* and is a practice that the security community opposes, another is against a device that is ‘intact.’Attackers can either register stolen card details to their own iPhone account, or they can intercept the SSL traffic between the device and the Apple Server to make fraudulent payments directly from the victim’s phone.”

The advice, as always, is to avoid jailbreaking a device in the first instance. Another precaution is for users to avoid downloading unnecessary applications which will help prevent malware from being added to the device. In tandem, users must be vigilant when using ApplePay to purchase items online, particularly monitoring for the use of ‘https’ or fraudulent websites, and to avoid doing so when using public wifi when traffic is most vulnerable.

Timur will present his findings in the Jasmine Ballroom at BlackHat USA, Las Vegas, on Thursday, 27 July at 9am local time.

To find out more information about Positive Technologies, and its solutions, visit:


About Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. Learn more about Positive Technologies at


Press Contact:

Elizabeth Nikolova
Account Executive
Tel: 0203 696 5822

Comments are closed.