Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

No More China Tech: 57 Million Credit Card Machines Likely Compromised: Hundreds of millions of credit card users join Zoom and TikTok in likely data loss to China
Epoch Times ^ | 11/09/2021 | Anders Corr

Posted on 11/09/2021 8:59:17 PM PST by SeekAndFind

News Analysis

Americans and allies are too dependent on China tech, as demonstrated by recent revelations that our Chinese-manufactured credit card machines are sending data back to China for no good reason.

The U.S. Treasury Department says that millions of Chinese point-of-sale (POS) devices, the credit card machines found at check-out counters, could be sending customer data back to China for no good reason.

Treasury Department lab tests show that the data is encrypted and sent to unknown third parties in China. The transmissions are “superfluous to normal payment transaction processing,” according to a letter from the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP), as quoted in Bloomberg News. The China-bound data transmissions are larger and more frequent than the transmissions of normal payment transactions.

“Treasury’s preliminary assessment is that data transmission by these devices indicates the possibility of risks to customer data confidentiality,” a Treasury spokesperson emailed to Bloomberg.

A subsidiary of the Chinese company, PAX Global, claimed that the security concerns were just “rumors.” The company’s headquarters are split between Hong Kong and Shenzhen, China. PAX has manufactured 57 million terminals that operate in 120 countries around the world, according to its own claims.

On Oct. 26, the FBI raided PAX offices in Jacksonville, Florida. And two days later, the company’s senior vice president of security and services quit her job.

A British security agency is also investigating the Chinese POS device manufacturer.

Cybersecurity expert Brian Krebs reported that the FBI raid was not only linked to the discovery of “unusual network packets” from the company’s terminals, but to reports that the PAX systems could be linked to cyberattacks, hacks, and illicit data collection on U.S. and European Union organizations.

Financial company FIS Worldpay, a Florida-based payment processing company, has for security reasons been forced to replace its PAX terminals with machines from American and French manufacturers. A FIS spokesman explained that the reason FIS is replacing PAX terminals is because FIS “did not receive satisfactory answers from PAX regarding its POS devices connecting to websites not listed in their supplied documentation.”

The likely compromise of American and allied financial data by Chinese-manufactured POS credit card machines is the tip of the iceberg of vulnerability to China tech. Other China-linked companies, like Zoom, TikTok, and computer and cell phone manufacturers, have hundreds of millions of global users who are vulnerable to data loss to China.

Zoom was downloaded 485 million times in 2020, and continues to have serious security issues. In 2020, the FBI issued a security warning about Zoom, and the Department of Defense forbade its affiliates to use the video-conferencing application. Zoom’s encryption keys were available to the Chinese regime, and its international meeting traffic routed through Chinese servers.

Yet in 2020, 90,000 schools in 20 countries made the wrong decision and utilized Zoom. Skype and Google provide better video calls, but the Zoom craze has gone dangerously viral.

The high rate of usage among naive Zoom users, many of whom are children, is not due to lack of warning.

“Zoom was found to be sending unauthorised data to Facebook,” according to a recent article in the Business of Apps. Its past hoarding of data and sub-standard encryption, identified by academic researchers, is well known. “Zoom saw itself banned by governments for official business (Canada and Taiwan), numerous organisations (SpaceX and Nasa) and school boards (New York and Taiwan),” according to the article.

As late as September 2021, Zoom software allowed remote code execution, that is, hacking of user machines over the internet. Zoom supposedly found and fixed the vulnerability, which is why we know about it. But with a lagging track record on security over the years, which is often only fixed when Zoom is caught with its hand in the digital cookie jar, who knows what remains. Prudence should be the order of the day. Stop using Zoom.

TikTok is even closer to China, and was downloaded 850 million times in 2020, and over three billion times overall. Twenty-eight percent of TikTok users are under the age of 18, and 59 percent are female. North America had 105 million users in 2020.

TikTok is owned by ByteDance, which is headquartered in Beijing.

Due to national security concerns, India banned the app in June 2020. Two months later, President Donald Trump signed an executive order requiring either the divestment of Bytedance from TikTok, or an American purchase of the app. However, the Biden administration unwisely revoked the order.

In April, the Beijing regime doubled down by taking a 1 percent stake in a key Bytedance management company, and one of its three board seats, according to The Information.

In response, Senator Marco Rubio (R-Fla.) rightly blasted the Biden administration, which he said “can no longer pretend that TikTok is not beholden to the Chinese Communist Party. Even before today, it was clear that TikTok represented a serious threat to personal privacy and U.S. national security. Beijing’s aggressiveness makes clear that the regime sees TikTok as an extension of the party-state, and the U.S. needs to treat it that way. President Biden must take immediate action to remove ByteDance and TikTok from the equation.”

Rubio rightly went beyond just a whack-a-mole approach. “We must also establish a framework of standards that must be met before a high-risk, foreign-based app is allowed to operate on American telecommunications networks and devices,” he said.

The problem is not only China-linked software, however, but also the American and allied dependence on China’s manufacture of computers, tablets, and phones. Ninety percent of computers, and 70 percent of cell phones, are manufactured in China. All of this hardware, therefore, includes a higher level of security risk.

The world’s electronic device manufacturing processes are largely controlled by the Chinese Communist Party, which has proven to be unscrupulous in its pursuit of power. We tend to ignore the attendant perils for reasons of convenience and budget, but we do so at our own grave risk.

The U.S. Treasury Department has hinted that technology from China should be rejected because of the higher risk it entails.

“OCCIP encourages stakeholders in the U.S. financial system to adopt a risk-based approach to protecting the confidentiality of their customers’ data, the integrity of their networks, and the availability of their services,” the Treasury Department said in this month’s letter about the PAX investigation. “Banks and financial service providers should apply this risk-based approach to their supply chains.”

While such warnings are welcome, they are entirely insufficient. We need laws and executive orders that mandate and provide for a fully secure technological environment for America and our allies. Our information security depends upon U.S. and allied control and protection of all information technology, from seed investment, to ownership, hardware manufacture, and the writing and operation of software that gives life to our networks. Nothing else will do.

It is unconscionable that U.S. and allied governments continue in their failure to protect our democratic communities from unscrupulous China-linked technology manufactures, including software like TikTok and hardware like computers, phones, and credit card machines, at the expense of American and allied privacy, workers, and the diversity of our industrial ecosystems, and those of our allies.

Our democratic governments must get smart fast, or the loss to China will be irreversible, and ultimately entail the loss of democracy itself.

Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times.


Anders Corr has a bachelor's/master's in political science from Yale University (2001) and a doctorate in government from Harvard University (2008). He is a principal at Corr Analytics Inc., publisher of the Journal of Political Risk, and has conducted extensive research in North America, Europe, and Asia. He authored “The Concentration of Power” (forthcoming in 2021) and “No Trespassing,” and edited “Great Powers, Grand Strategies.”


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Front Page News; News/Current Events
KEYWORDS: cards; china; creditcard; espionage; hacking; internet; paxglobal; privacy; robinhood; socialmedia; surveillance; theft; tiktok
Navigation: use the links below to view more comments.
first 1-2021 next last

1 posted on 11/09/2021 8:59:17 PM PST by SeekAndFind
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

Ain’t globalism grand.


2 posted on 11/09/2021 9:03:59 PM PST by Jim Robinson (Resistance to tyranny is obedience to God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

A hard lesson for the stupid.


3 posted on 11/09/2021 9:05:54 PM PST by windsorknot
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

This is Fake News.

I know cause it says twice in the first two sentences

“Back to China for no good reason.”

I know for a fact that if data were actually sent, it was sent for a good reason.

Even if I were ADA in the Rittenhouse case I could figure that out


4 posted on 11/09/2021 9:12:32 PM PST by algore ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: AdmSmith; AnonymousConservative; Arthur Wildfire! March; Berosus; Bockscar; cardinal4; ColdOne; ...

5 posted on 11/09/2021 9:30:39 PM PST by SunkenCiv (Imagine an imaginary menagerie manager imagining managing an imaginary menagerie.)
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

When it became inevitable China was our enemy something about all this tech-cozy with China should have been done. Now with the disgusting Democrat-Boors in all the Call-the-shots places it will only be a matter of time we will be eating our pets instead of petting them.


6 posted on 11/09/2021 10:09:35 PM PST by rockinqsranch (Dems, Libs, Socialists Call 'em what you will, they all have fairies livin' in their trees)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

9 Nov: UK Express: What’s going on? China stays quiet as Evergrande chaos threatens to sink economy
CHINA’S ruling Communist Party has continued to remain quiet despite fears its vital property market could crash.
By BILL MCLOUGHLIN
https://www.express.co.uk/finance/city/1519060/china-news-evergrande-property-market-debt-xi-jinping


7 posted on 11/09/2021 10:24:57 PM PST by MAGAthon
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

It’s called, “phoning home.” Pretty much every device made in china that has the capacity, does so. Often it is delayed for days or weeks before it starts, just in case someone is testing it when new.

It’s insidious, pervasive, and our sellout “leaders” won’t stop it. They got theirs, and are set for life.


8 posted on 11/09/2021 10:32:46 PM PST by Basket_of_Deplorables (Convention Of States is our only hope now! Desantis 2024!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

NSA please adjust the gateways with a simple permit or deny.


9 posted on 11/09/2021 11:43:08 PM PST by Jumper
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jim Robinson

Jim
Biden is lowering America’s standards to bring this country economically in line with EU, Canada and the Anglo’s. The prices are too low and quantities to much currently. Trump policies had the US pulling ahead farer and faster. Biden is FastTracking globalization and standardized pricing.

Maybe we can use the new NATO Rubble or NWO Lira....

The Republicans can disrupt the NWO by ensuring American consumers are not paying inflated Standardized Prices that the EU is pushing to slow the USA down.


10 posted on 11/09/2021 11:53:03 PM PST by Jumper
[ Post Reply | Private Reply | To 2 | View Replies]

To: SeekAndFind

I use cash wherever possible.
If you do not take cash, someone else will


11 posted on 11/10/2021 3:56:14 AM PST by Steven Tyler
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind; GOPsterinMA; Army Air Corps

Oof.


12 posted on 11/10/2021 5:20:10 AM PST by KC_Lion
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Gotta love them Trojan Horses! with a man in the middle.
13 posted on 11/10/2021 5:21:35 AM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
TikTok is owned by ByteDance, which is headquartered in Beijing.

While Biden is owned by Shanghai.

14 posted on 11/10/2021 5:23:17 AM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jim Robinson
The China-bound data transmissions are larger and more frequent than the transmissions of normal payment transactions.

It's called:

Know thine enemy.


15 posted on 11/10/2021 5:24:48 AM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: SeekAndFind
Chinese POS device manufacturer

Point Of Sale but imho, everything china makes is a different meaning of POS.

16 posted on 11/10/2021 6:25:06 AM PST by Pollard (PureBlood -- youtube.com/watch?v=VXm0fkDituE)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind; 4everontheRight; 4Liberty; 5thGenTexan; 45semi; 101stAirborneVet; 300winmag; ...
Prepper Financial Ping :Chinese Manufactured ATM's as Possible Security Risk
Two days after FBI raid at the Jacksonville, Florida offices of Pax Global,
the company's Senior Vice President of Security and Services quit her job

(From the article):” A subsidiary of the Chinese company, PAX Global, claimed that the security concerns were just “rumors.”
The company’s headquarters are split between Hong Kong and Shenzhen, China.
PAX has manufactured 57 million terminals that operate in 120 countries around the world, according to its own claims.
On Oct. 26, the FBI raided PAX offices in Jacksonville, Florida.
And two days later, the company’s senior vice president of security and services quit her job.
A British security agency is also investigating the Chinese POS device manufacturer. “

“Cybersecurity expert Brian Krebs reported that the FBI raid was not only linked to the discovery of “unusual network packets” from the company’s terminals,
but to reports that the PAX systems could be linked to cyberattacks, hacks, and illicit data collection on U.S. and European Union organizations. “

Also of concern to U.S. security authorities is the use of software programs of Tik Tok and Zoom, despite their signiicant increased usage during the covid pandemic.
(More information in the article)

17 posted on 11/10/2021 7:27:50 AM PST by Tilted Irish Kilt
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
Our democratic governments must get smart fast, or the loss to China will be irreversible, and ultimately entail the loss of democracy itself.

Uh--is it still "democracy" when elections are blatantly stolen and none of the perps are brought to justice?
18 posted on 11/10/2021 7:33:33 AM PST by cgbg (A kleptocracy--if they can keep it. Think of it as the Cantillon Effect in action.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: null and void; aragorn; AZ .44 MAG; Baynative; bgill; bitt; Black Agnes; blueyon; Califreak; ...
PING

57 Million Credit Card Machines Likely Compromised:

Hundreds of millions of credit card users join Zoom and TikTok in likely data loss to China.

19 posted on 11/10/2021 10:17:31 AM PST by LucyT (Chicken Little was right. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: LucyT

All depends on what the traffic is.

Code Signing with a certificate authority, a revocation list server china, is so common with IOT and POS devices. It 95% sloppy coding techniques and 5% lack of testing by the credit card companies that certify the endpoints that are allowed to join the particular CC clearing service.

The protocols by standard and firewall rule work over port 80 and are sniffable. We at fortune 500 run how good or bad the code signing CAs are daily. By changing the padding of the request, either in the post or the request header it has been shown data can be moved at a very low rate. A few bytes per request, but for some applications that is enough.

The industry I am in, the Q testers tend to call the vendor who supplied a .jar, and 99% of the time it is java code container, and have them respin the code signing to a world wide certificate company so we have someone to sue in case of breach. The request to china takes 300ms to fullfil and most implantation of java do not parrell code signing checking very well. So 3 to 5 signed .jar in the wrong region tend to add human noticeable delays.

This is a very well known issue among people who test hardware with vendor provided “java inside”. Your typical firewall administrator audits logs looking for traffic to the less trusted (china based) code signing certificate providers. With POS systems unfortunately most administrators just allow what comes out of any new black box. Well until the Target hack.

You now know how critical the connectivity to the CRL and OCSP servers are for daily life. It is some of the most robust services of the internet you probably did not know about.

Other phone backs are trivial to block unless sent to Amazon and Azure, then every call could be a update service enabler that needs to be figured out, or the notified vendor drops the call from the code revision. The code guys are sloppy and most of the time dont realize those telemetry blocks made it to production code. With any skill of code hiding CC machines are leaking customer information to china and everyone else.

But that same CC information can be bought legitimately from the CC transaction providers. It is marketing data that you buy a slurpy, 2 longjohns and 8 gallons of gas every morning at 5am at the local 7-11. It probably can be figured out when you start buying sex lube at any drug store. Cash is king when wishing to go off book with China, Your Wife or Your Bank (and FBI).


20 posted on 11/11/2021 4:32:00 AM PST by protoconservative (Been Conservative Before You Were Born )
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson