Public transport Express Mode function on iPhone:YouTubers show potential attack

With Express Mode, you can quickly pay your ticket via NFC in subway systems like in London or New York. Is there a security vulnerability here?

listen Print view
Attack on Express Mode

Attack on Express Mode: Visa considers itself secured.

(Image: Veritasium / Screenshot YouTube)

3 min. read

iPhone and Apple Watch have a feature as part of Apple Pay that is intended to facilitate the use of public transport systems worldwide. With the so-called Express Mode, you only need to hold your device to the reader at the access gate, and it automatically triggers your ticket via a stored credit card. This works in the New York subway or in London, for example. Unlocking the Apple device via fingerprint, facial recognition, or PIN is not necessary if you have activated Express Mode.

But how secure is that? Would it be possible to make purchases on someone else's behalf using the credit card stored with Apple Pay? A video from the well-known science channel Veritasium has now investigated this more closely. The result: With (quite a lot of) effort and special hardware, as well as cards from a specific credit card issuer, a significant sum of money could be stolen from the well-known YouTuber MKBHD during a test run.

The approach is not entirely new; as early as 2021, security researchers from the Universities of Surrey and Birmingham were able to demonstrate the procedure. However, little seems to have changed since then. The reason: Visa, the card issuer affected, believes it is unlikely that the attack will occur in practice. Furthermore, Apple told Veritasium that Visa stated that the usual payment protection applies. Affected individuals can therefore dispute the credit card charge, even if it is likely to be associated with a lot of hassle.

Videos by heise

The attack itself is a man-in-the-middle attack: the iPhone is placed on a manipulated NFC reader that presents itself as a legitimate public transport terminal. It wirelessly extracts payment data from the iPhone, which is then forwarded to a laptop where it is manipulated using a Python script. The information is then relayed to a burner device – apparently a rooted Android phone. The latter then actually executes the transaction when placed on a card reader – using the iPhone's data. The manipulated reader had to have the same terminal ID as a legitimate tap-to-pay terminal in a public transport station. The complex method does not work with MasterCard and American Express, as it is apparently less easy to forward legitimate data to the Android device.

Interesting: One of the problems discovered by the researchers was that iOS, in its current form, apparently trusts that the NFC reader indicates that the requested amount is a small one. However, this is not actually checked; only a flag is read and believed. This is not the case with devices from other manufacturers, says Veritasium. This means that the iPhone could be tricked into believing it was a small payment, which is common for Express Mode, while $10,000 was actually debited.

It is unclear whether criminals actually use the complex method. Those who want to be on the safe side should not use the public transport Express Mode with Visa cards. Then the attack method should fundamentally not be possible.

Empfohlener redaktioneller Inhalt

Mit Ihrer Zustimmung wird hier ein externer Preisvergleich (heise Preisvergleich) geladen.

Ich bin damit einverstanden, dass mir externe Inhalte angezeigt werden. Damit können personenbezogene Daten an Drittplattformen (heise Preisvergleich) übermittelt werden. Mehr dazu in unserer Datenschutzerklärung.

(bsc)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.