Root shell on a credit card terminal

Architecture and Scope of the Hack

  • Terminal has two processors: a “secure” one (mp1) handling card, PIN, crypto, and display; and an “insecure” Linux one (mp2) handling networking, updates, and business logic.
  • The root shell was obtained only on mp2. Card, keypad, and secure display paths appear to be mediated via mp1 and not directly accessible from Linux.
  • Secure firmware and its loader (“loadercode”) are signed and integrity‑checked, likely by a ROM or secure element; attempts to tamper with loadercode caused boot failure.

Risk to Card Data and Transactions

  • Multiple commenters highlight that, per the article, sensitive data (PANs, PINs) do not appear reachable from the Linux side.
  • Modern chip/tap cards behave like small HSMs, signing transaction data with on‑card keys and often using dynamic per‑transaction cryptography.
  • Some argue that with physical/root access “you’re owned,” but others emphasize the split architecture: the compromised OS is more like a network modem than a card‑handling stack.

Physical Access, Tamper Logic, and Keys

  • Tamper detection is described as hardware‑implemented, with both processors reading dedicated registers; commenters believe it cannot be trivially spoofed from Linux.
  • When tamper triggers, working keys are zeroed and must be re‑injected; this is standard practice for EMV terminals.
  • Denial of service via physical abuse (drop, water) is seen as easier than any software DoS.

Potential Attack Vectors Discussed

  • Plausible impacts of mp2 compromise: denial of service (boot loops), man‑in‑the‑middle on networking, and possibly abusing firmware‑update tooling if signing/authorization is weak.
  • People discuss theoretical attacks like changing displayed vs actual amount or redirecting funds, but multiple replies note that:
    • Amount display and PIN entry on certified terminals are typically under secure‑kernel control.
    • Merchant IDs and settlement accounts are enforced by back‑end processors; mismatches are rejected or easily reversed.

EMV, Magstripe, and Ecosystem Context

  • Thread contrasts EMV chip/tap (dynamic, harder to skim/clone) with magstripe (static, easily skimmed); some note this terminal still has a magstripe reader.
  • Discussion covers offline transactions, airline/restaurant behavior, and merchant‑cloned POS fraud, but these are framed as ecosystem/contract issues more than terminal‑root issues.

Meta / Hacker Culture

  • Many praise the write‑up as “real hacking”: hardware teardown, UART discovery, BGA rework, and reverse‑engineering.
  • Some lament that such hands‑on technical work is rarer on HN amid LLM and startup content.