I have signed up with a new current account in the UK for day-to-day transactions. The account comes with a payment (debit) card. The banking institution's security handling of PINs for payment cards is something that I think would be interesting for an audience of security professionals, and I wonder if it is not good enough.
Here is the instructions that accompany the card sent via postal mail:
How to activate your card
When you receive your digipass [electronic OTP code generator] and digipass PIN, log onto your internet banking
To retrieve your six digit access code click on 'Account Management' and then the 'Cards' tab
Using your mobile number you provided in your application, text '{BANKNAME} PINACT' followed by your access code, followed by the last four digits of your card number (e.g. {BANKNAME} PINACT 123456 7890) to {SMS number}
You'll be sent your debit card PIN via text
You're ready to use your card (remember to sign the back). The first time you use it you will need to enter your PIN - at an ATM or within a store
I went through the instructions, and received this SMS:
Your card is active and the PIN for your {bankname} Bank Debit Card ending with XXXX is YYYY. Please delete this message after reading.
I take the view that security is a balance between convenience versus the attractiveness of a target. In this case, the target is a supply of PIN codes for payment cards, for presumably tens of thousands of customers, sent in an unencrypted channel over the public telephony system. I note also there are no encouragements that PINs should be changed when they are received.
Moreover, it seem strange that one obtains a one-time security code from an internet banking site (secure and encrypted) in order to obtain a permanent PIN code via SMS (interceptable). Should that not have been the other way around?
In the UK it is common practice for customers to be told not to reveal their payment card PINs to "anyone, not even the police". And yet this bank has provided PIN codes for all of their customer's payment cards over a plaintext comms channel (and thus, by extension, the police, who have realtime access to all unencrypted comms in the UK).
There are three mitigating reasons the bank may have:
- PINs are useless without a physical card, and they are not used for "cardholder not present" transactions
- Most card providers support PIN changing at ATMs
- Tens or hundreds of thousands of UK customers have been served their PINs in this fashion, and none of them have been defrauded as a result of SMS interception†
However, I am still not certain good practices have been followed here. Am I right in believing this security could be improved, and would my suggestion of using SMS for one-time codes and the (HTTPS) banking web app to show PINs, offer better overall security?
† I don't actually know this, I am just guessing what the bank might claim.