Get ready for a facepalm: 90% of credit card readers currently use the same password.
The passcode, set by default on credit card machines since 1990, is easily found with a quick Google searach and has been exposed for so long there’s no sense in trying to hide it. It’s either 166816 or Z66816, depending on the machine.
With that, an attacker can gain complete control of a store’s credit card readers, potentially allowing them to hack into the machines and steal customers’ payment data (think the Target (hacks all over again). No wonder big retailers keep losing your credit card data to hackers. Security is a joke.) and Home Depot ( )
This latest discovery comes from researchers at Trustwave, a cybersecurity firm.
Administrative access can be used to infect machines with malware that steals credit card data, explained Trustwave executive Charles Henderson. He detailed his findings at last week’s RSA cybersecurity conference in San Francisco at a presentation called “That Point of Sale is a PoS.”
The problem stems from a game of hot potato. Device makers sell machines to special distributors. These vendors sell them to retailers. But no one thinks it’s their job to update the master code, Henderson told CNNMoney.