Google Wallet locked after flaw found
The tech giant disables prepaid card use on its Wallets after a researcher finds a security hole.


Google has disabled the use of prepaid cards in its Wallet service after security researchers claimed a flaw in the technology could allow a hacker to acquire the user's PIN number.
The company temporarily disabled provisioning of prepaid cards for Google Wallet as a precaution until a permanent fix was found.
Despite the action and the research that inspired it, Google claimed its Wallet was perfectly safe to use. It said security issues were more likely to arise if users rooted their phones.
We were able to uncover the contents of the binary data and were shocked at what we found.
"People are asking if Google Wallet is safe enough for mobile phone payments. The simple answer to this question is yes. In fact, Google Wallet offers advantages over the plastic cards and folded wallets in use today," said Osama Bedier, vice president of Google Wallet and Payments, in a blog post.
"But sometimes users choose to disable important security mechanisms in order to gain system-level root' access to their phone; we strongly discourage doing so if you plan to use Google Wallet because the product is not supported on rooted phones. That's why in most cases, rooting your phone will cause your Google Wallet data to be automatically wiped from the device."
The flaw itself did require root privileges to succeed.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Finding the flaw
Joshua Rubin, a senior engineer with zvelo, claimed to have found the vulnerability in Wallet after looking through a "metadata" table in the database used by Google Wallet.
After cracking open the "deviceInfo" row within that table, he uncovered plenty of valuable information.
"We were able to uncover the contents of the binary data and were shocked at what we found," he explained in a blog post.
"Unique User IDs (UUID), Google (GAIA) account information, Cloud to Device Messaging (C2DM, also known as "push notification") account information, Google Wallet Setup status, "TSA" (this is probably related to "Trusted Services" not the "Transportation Security Administration") status, SE status and most notably "Card Production Lifecycle" (CPLC) data and PIN information."
Subsequently, Rubin discovered in the PIN information section a long integer "salt" and a SHA256 hex encoded string "hash." All he had to do then was run a brute force attack to determine the PIN itself.
"It dawned on us that a brute-force attack would only require calculating, at most, 10,000 SHA256 hashes. This is trivial even on a platform as limited as a smartphone. Proving this hypothesis took little time," he added.
"Google Wallet allows only five invalid PIN entry attempts before locking the user out. With this attack, the PIN can be revealed without even a single invalid attempt. This completely negates all of the security of this mobile phone payment system."
Rubin said he had been in contact with Google and the company said it was working quickly to resolve the issue.
The researcher suggested Google may have some trouble in releasing a proper fix as it needed to move the PIN hash and salt details into the Wallet's Secure Element (SE), used to store and encrypt sensitive data like credit card information. This would take time and mean additional financial costs for banks allowing customers to use the service.
"At present, the decision is in the banks' hands. They may actually choose to accept the risk imposed by this vulnerability rather than incur the financial and administrative overhead of allowing Google to release a proper fix (and thereby potentially put the banks on the hook for the PIN security)," Rubin added.
"zvelo feels that this would be a grave mistake and would expose users to undue risk."
It appears Google has been given time to resolve the issue.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Capita tells pension provider to 'assume' nearly 500,000 customers' data stolen
Capita told the pension provider to “work on the assumption” that data had been stolen
By Ross Kelly Published
-
Gumtree site code made personal data of users and sellers publicly accessible
News Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website
By Connor Jones Published
-
Pizza chain exposed 100,000 employees' Social Security numbers
News Former and current staff at California Pizza Kitchen potentially burned by hackers
By Danny Bradbury Published
-
83% of critical infrastructure companies have experienced breaches in the last three years
News Survey finds security practices are weak if not non-existent in critical firms
By Rene Millman Published
-
Identity Automation launches credential breach monitoring service
News New monitoring solution adds to the firm’s flagship RapidIdentity platform
By Praharsha Anand Published
-
Neiman Marcus data breach hits 4.6 million customers
News The breach took place last year, but details have only now come to light
By Rene Millman Published
-
Indiana notifies 750,000 after COVID-19 tracing data accessed
News The state is following up to ensure no information was transferred to bad actors
By Rene Millman Published
-
Pearson fined $1 million for downplaying severity of 2018 breach
News The SEC found the London-based firm made “misleading statements and omissions” about the intrusion
By Rene Millman Published