I'd be more worried about someone compromising a card reader in the field and reading cached/stored real CC details, or installing some kind of intercepting malware. (That does seem to be difficult/impossible in this specific case, but it means research in this area is relevant.)
rockbruno|9 months ago
literalAardvark|9 months ago
weaksauce|9 months ago
nine_k|9 months ago
jhugo|9 months ago
Only if the card is swiped (magnetic stripe) rather than tapped or inserted. EMV doesn't expose the full card details to the merchant; the card signs a payload with its internal private key and transmits it.
And the OP's root access wouldn't give card details in any case, because they didn't get root on the part of the reader that processes the transactions.
reaperducer|9 months ago
That's happened at least several times already.
I believe breached PoS terminals were what happened in the big Target hack.
lelanthran|9 months ago
The problem is that PoS terminals are not EMV terminals. EMV terminals have been through a certification process, and the hardware part of that certification ensures that the vendor only runs signed-binaries.
Honestly, even if you could write and sideload (or even replace) the applications on the EMV terminal, I do not see a way to get them to a) run, and then b) send money elsewhere.
adolph|9 months ago
https://tech.target.com/blog/cybersecurity-easysweep
https://news.ycombinator.com/item?id=36788831
christina97|9 months ago
account42|9 months ago