đź’µ
ITU DFS Security Assurance Framework
  • Acronyms
  • Executive Summary
  • Introduction
  • ITU-T Recommendation X.805 Overview
  • DFS Provider Business Models
  • Elements of DFS ecosystem
  • Security threats
  • DFS Security Assurance Framework
    • Risk assessment methodology
      • Assessment of DFS security vulnerabilities, threats and mitigation Measures
  • DFS security vulnerabilities, threats and mitigation Measures In order to systematical
    • Account and Session Hijacking
    • Attacks against systems and platforms
    • Code Exploitation Attacks
    • Data Misuse
    • Denial of Service Attacks
    • Insider Attacks
    • Man-in-the-middle and social engineering attacks
    • Compromise of DFS Infrastructure
    • Compromise of DFS Services
    • SIM attacks
    • Unauthorized access to DFS data
    • Malware
    • Rogue Devices
    • Unauthorised Access to Mobile Devices
    • Unintended Disclosure of Personal Information
    • Zero-Day Attacks
    • Attacks against credentials
Powered by GitBook
On this page
  • Affected entity: Third-Party, DFS Provider
  • Affected entity: Third-Party, DFS Provider
  • Affected entity: MNO
  1. DFS security vulnerabilities, threats and mitigation Measures In order to systematical

Malware

Elements within the DFS being susceptible to infected by malware.

Risk: Malware attacks and inability to transact, service outages, and unauthorised access to data occur at the Merchant / DFS provider

Affected entity: Third-Party, DFS Provider

  • Vulnerability: Failure to use anti-malware

  • Vulnerability: Undetected system application weaknesses (SD: Data Confidentiality)

    • Control 13.5: The merchant should work with its solution provider to ensure that any audit or logging capability is enabled. The solution provider should ensure that logging capabilities exist with enough granularity to detect abnormal events.

    • Control 13.6: The solution provider should guide the merchant on the merchant’s responsibility to review the logs. Additionally, regularly inspect system logs and reports for abnormal activity. If abnormal activity is suspected or discovered, discontinue access to the mobile device and its payment application until the issue has been resolved. Abnormal activities include, but are not limited to, unauthorized access attempts, escalated privileges, and unauthorized updates to software or firmware.

Affected entity: Third-Party, DFS Provider

  • Vulnerability: Network exposure to outside attacks (SD: Availability)

Risk: Installation of malware such as spyware and trojans

  • Vulnerability: No anti-malware or anti-virus software is used or updated regularly (SD: Availability)|

Risk: remote code execution

  • Vulnerability: Obsolete device software

  • Vulnerability: No anti-malware or anti-virus software is used or updated regularly (SD: Availability)

  • Vulnerability: User device tampering and rooting (SD: Integrity)

Affected entity: MNO

Risk: Inability to transact and service compromise

  • Vulnerability: Network exposure to outside attacks (SD: Availability)

PreviousUnauthorized access to DFS dataNextRogue Devices

Last updated 2 years ago