Rubin said that Google has been alerted to the vulnerability and is moving swiftly to fix it. He has not made his wallet “Cracker” application public.
“Google Wallet allows only five invalid PIN entry attempts before locking the user out,” Rubin said in a blog post.
“With this attack, the PIN can be revealed without even a single invalid attempt,” he continued. “This completely negates all of the security of this mobile phone payment system.”
Google declined an AFP request for comment.
“Once attackers get your PIN, they have full access to any credit card information stored in the app and they can use your phone to make purchases,” McAfee security firm researcher Jimmy Shah said in a blog post.“As a user of Google Wallet, the main security you see is the PIN,” McAfee added.
“What makes Wallet easy for you to use now makes it easy for attackers to use; they can now spend your money and credit just as if your phone were an ATM card.”
Rubin dismissed the threat of hackers picking Google Wallets remotely, explaining that physical access is needed to get priority access to controls in a process called ” rooting.”
Security specialists advise Google Wallet users not to “root” smartphones, and to enable security features such as full-disk encryption and screen locks.
Google Wallet is available only on Nexus S and Galaxy Nexus smartphones. Google said it planned to expand the feature to more Android phones.
Receive new posts on Time to Hack via email
Get the latest posts delivered right to your inbox