• Skip navigation
  • Skip to navigation
  • Skip to the bottom
Simulate organization breadcrumb open Simulate organization breadcrumb close
Friedrich-Alexander-Universität IT Security Infrastructures Lab
  • FAUTo the central FAU website
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Suche öffnen
  • Campo
  • StudOn
  • FAUdir
  • Jobs
  • Map
  • Help
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Friedrich-Alexander-Universität IT Security Infrastructures Lab
Navigation Navigation close
  • Research
    • Forensic Computing Group
    • Human Factors in Security and Privacy Group
    • Multimedia Security
    • Security Education Development Group
    • System Security Group
    • Information Security Group
    • Archive
    • Funded Projects
    • Publications
    Portal Research
  • Lab
    • Staff & Research Groups
    • Alumni
    • Partners
    • FAU i1 Webshop
    Portal Lab
  • Teaching
    • Courses
    • General Information regarding Teaching/Courses
    • Notes on Examinations
    • eTeaching
    • Theses
    • Writing a Thesis at Informatik 1
    Portal Teaching
  • How to reach us
  1. Home
  2. Research
  3. System Security Group
  4. AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking

AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking

In page navigation: Research
  • Forensic Computing Group
  • Human Factors in Security and Privacy Group
  • Information Security Group
  • Multimedia Security
  • Security Education Development Group
  • System Security Group
    • AppAuth: On App-based Matrix Code Authentication in Online Banking
    • AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
    • AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
    • Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    • Centroid
    • CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
    • FROST: Forensic Recovery Of Scrambled Telephones
    • How Android’s UI Security is Undermined by Accessibility
    • HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    • N26
    • Nomorp
    • On the Prevalence and Usage of TEE-based Features on Android
    • One Key to Rule Them All: Recovering the Master Key from RAM to break Android's File-Based Encryption
    • RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    • ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
    • RISCoT - Security Analysis of Trusted Execution Environments on RISC-V
    • SED (In)Security: Hardware-based Full Disk Encryption (In)Security
    • SGX-Kernel: Isolating Operating System Components with Intel SGX
    • SGX-Timing: Cache Attacks on Intel SGX
    • SoK: The Evolution of Trusted UI on Mobile
    • Soteria: Offline Software Protection within Low-cost Embedded Devices
    • STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
    • TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
    • VMAttack: Deobfuscating Virtualization-Based Packed Binaries
  • Archive
  • Funded Projects
  • Publications

AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking

Vincent Haupert

Dr.-Ing. Vincent Haupert

Associated Computer Security Researcher

Department of Computer Science
Chair of Computer Science 1 (IT Security Infrastructures)

  • Phone number: +4991618758323
  • Email: vincent.haupert@cs.fau.de
  • Website: https://vincent-haupert.de
  • Twitter: Page of Vincent Haupert
  • GitHub: Page of Vincent Haupert

(In)Security of App-based TAN Methods in Online Banking

Authors: Vincent Haupert and Tilo Müller, System Security and Software Protection Group.

Abstract: German banks are increasingly turning away from the established TAN methods. Their incentives for developing new technologies to replace the indexed TAN list, mTAN and chipTAN are both improved security and usability, which cannot be met with dedicated hardware. New app-based methods allow the user to initiate a transaction with his mobile device (Android or iOS), and to confirm it on the same device, with supposedly more security than in the established methods. We have evaluated the security of such app-based methods using the pushTAN method of the Sparkassen-Finanzgruppe savings banks as an example, and we can certify that the method has serious conceptual weaknesses. The deliberate decision not to use independent hardware for the transaction initiation and confirmation makes the method an easy prey for malware. To demonstrate these weaknesses, we developed an attack that captures transactions from the user and manipulates them at whim before their confirmation.

Press release FAU: An easy target for hackers (English) / Leichtes Spiel für Hacker (German)

Written report: (In)Security of App-based TAN Methods in Online Banking (English) / Auf dem Weg verTAN: Über die Sicherheit App-basierter TAN-Verfahren (German, GI SICHERHEIT 2016)

Demo: Version 1.0.4 (German, Oct 2015), Version 1.0.7 (German, Dec 2015)

Talk: 32. Chaos Communication Congress (German, Video, Slides)

Screenshots:

1.
Sign on using the banking app.

2.
Credit transfer to the tax administration…

3.
… worth € 0,10.

4.
Prompt to enter the TAN displayed in the pushTAN app.

5.
Switch to the pushTAN app.

6.
The transaction details appear to be correct. The user can transmit the TAN with a single click directly into the banking app.

7.
Back in the banking app the TAN is automatically filled in.

8.
After confirmation using the OK button the transaction completed successfully.

9.
Only the account statement details reveal that € 13,37 was sent to Vincent Haupert (instead of € 0,10 to the tax administration).

Please note:

  1. Implementation details have been blacked out and are independent of the conceptual weaknesses of app-based methods. The pushTAN method of Sparkasse serves explicitly as a possible example of our analysis. The security deficits of the Sparkasse app, as compared to other financial institutions that use similar methods, is out of scope.
  2. To avert damage to third parties we publish no programs, no code and no technical details which go beyond our written report—also not upon request.

 All content of this website is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International Germany License.

Lehrstuhl für Informatik 1
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)

Martensstrasse 3
91058 Erlangen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Facebook
  • RSS Feed
  • Twitter
  • Xing
Up