Mobile Payment Digital-Wallet-MOMO-Tran Thi My Anh
Mobile Payment Digital-Wallet-MOMO-Tran Thi My Anh
Information Technology
Bachelor of Engineering
2020
Author (authors) Degree title Time
Supervisor
Matti Juutilainen
Abstract
The objective of the thesis was to conduct a security testing on MOMO, the most popular
digital wallet in Vietnam. The goal was to determine the efficiency of security technologies
that are applied by MOMO.
In order to investigate the problem, theoretical research and studies were made based on
the working and security principles of mobile payment and e-wallet. The thesis also aimed
to broaden knowledge and provide deep understanding of mobile payment. This study
explored (i) different types of mobile payment in terms of technology, advantages and
disadvantages, (ii) the benefits and drawbacks of mobile payment in comparison to
traditional payment, (iii) the threat model associated with all stakeholders involved in the
mobile payment, (iv) security measures towards each stakeholder, and (v) security testing
in MOMO e-wallet with OWASP Top 10 as the primary guideline.
Quantitative research methods alongside the experiments were used to identify the security
threats that are considered as vulnerabilities in mobile payment. The primary data were
collected to get familiar with the target (MOMO) and perform the security evaluation in
practice. The analysis was done for each security risk with a separate framework to be
used. Based upon the summary of the security test result, the identified factors were
considered as certain suitable lessons learned to improve m-commerce in the future.
Research findings highlighted the diverse and constant development of mobile payment.
The study examined the security mechanism of MOMO and verified the security system.
The thesis contributes to a better understanding of mobile payment and digital wallet
security. The study can be a reference for further mobile payment Security study and
MOMO security enhancement.
Keywords
TERMINOLOGY .................................................................................................................. 6
1 INTRODUCTION .......................................................................................................... 8
5.1 Intercepting NFC communication in order to gather credit card information of the
consumer ....................................................................................................................... 57
5.5 Logging in to same account in multiple devices at the same time ........................ 63
7 CONCLUSION ............................................................................................................ 70
REFERENCES .................................................................................................................. 72
APPENDICES
TERMINOLOGY
1 INTRODUCTION
Together with the significant increase in the number of smartphone users, more
and more people these days are choosing mobile payment as their primary
payment method. Mobile payment, or in short, e-wallet, has become popular
during the 2010s, and will definitely continue to be even more popular in the near
future. The rise of mobile payment can be seen easily everywhere all over the
world.
The practical aim of the thesis is to investigate the security measures of MOMO,
one of the most popular mobile wallets in Vietnam. It is favoured because of high
security standard and excellent customer service response. Theoretical study on
mobile payment and digital wallet provides thorough insights over the security
mechanism and understanding to prepare for the security testing.
In order to accomplish the set goals, quantitative methods are used throughout
the study. The structure of the thesis is as follows:
At the end of the thesis, the efficiency of security technologies applied by MOMO
is verified from the theoretical research and the result of the security testing. The
study will contribute to improve mobile payment security in the future.
The primary knowledge about mobile payment will be introduced in the next
chapter.
This chapter covers basic knowledge and understanding of: mobile payment’s
definition and history overview, different types of mobile payment regarding the
technology implemented, and the comparison between the traditional payment
and mobile payment. The study on this chapter will provide sufficient knowledge
in the theoretical part and better guiding for the practical part in the 5th chapter.
2.1 Definition
Mobile payment has a big influence on the economy. It eases the complexity of
micropayments. It extends the use of financial payment within the community. It
pushes the number of transactions made per day by introducing new secure and
11
The description of this section about the history of mobile payment bases on the
discussion of Flavio (2015) and John (2016).
The history of mobile payment has been dated back in 1997, when Coca Cola
allowed their customers to purchase drink via mobile in Helsinki. Coca Cola set
up a vending machine so that people could send a text message to select and
purchase their drink. In the meantime, RFID (Radio Frequency Identification) was
introduced by ExxonMobile as a keyring and swiped to pay instantly at the pump.
This Speedpass is the first contactless payment to be made at that time.
Beginning with the rapid growth of mobile users and high technology, the
12
development of Web payment evolves into the current wave mobile payment, or
digital wallet. Online banking was believed to be first in use by Pizza Hut in 1994.
In 1999, Ericsson made it possible to purchase movie tickets via mobile phones.
The number of cell phone users who made online payment rose to 95 million in
2003. In 2008, Apple and Android started opening their Appstore to third-party
developers, offering an opportunity for building marvelous amounts of
applications. To people’s surprise, the first digital wallet comes from Google.
Google Wallet set the very first step to the market. Nevertheless, it has some
limitations due to the fact that it is only used on one particular model and
accepted by few merchants. But thanks to the awaiting release of Apple Pay in
2014, followed by Samsung Pay a year later, digital wallet set its step to the
market and played a significant role in the revolution of mobile payment. It
involved the majority of mobile users to start using those Pays application for the
purchase. The first and favorite merchants were Starbucks, Walmart, and Dunkin
Donuts.
Proximity payment refers to the most common payment method we often see
with mobile devices from a close distance. One can purchase at available POS
(Point of Sale) in stores or at vending machines by an NFC-enabled mobile
phone. It will carry and load encrypted data in a secure way, the same as
contactless payment cards.
The concept of e-wallet has emerged long ago in the online commerce. Pay Pal
was the first to support digital wallet for the major online commerce, eBay, at the
time. The launch of Apple Pay in 2014 broadened digital wallet’s place in the
financial market.
Over 50% of the young generation uses mobile wallet as their primary payment
method (Jaime 2019). Figure 1 shows that in 2019, there are many digital wallet
choices coming from large corporations such as Apple Pay, Google Wallet,
Alipay, Samsung Pay, Wechat Pay, etc.
14
Figure 2 also indicates countries with highest adoption rate of mobile payment:
According to Guo (2016), digital wallets are categorized into four types as folows:
• Open wallet can be used freely to purchase goods, services and other
financial transactions such as funds transfer, cash withdrawal.
• Semi-open wallet can be used to buy items and services at merchants’
POS, but unable to allow consumers to withdraw cash.
• Closed wallet is a specific software application that is built only for the
use of a particular brand or store. For example, Walmart Pay and Amazon
Pay are designed exclusively for facilitating the purchase for a single
vendor. Closed wallet does not permit cash withdrawal or redemption.
• Semi-closed wallet can be used for buying goods and services,
performing financial activities at a selected number of merchants or
outlets. Semi-closed wallet covers certain locations that have contracts
with an issuer to accept this payment instruments. This kind of wallet
cannot be used to withdraw money either.
Benefits:
• Low cost: Digital wallet eliminates intermediates, therefore reducing the
cost adoption and implementation.
• Convenience: With user’s card integrated to the mobile phone, they can
make purchases easily and hassle-free.
• Increase revenue: Since it is very convenient to use, digital wallet
promotes the growth of business markets, introduces mobile payment to
places where only traditional cash was accepted before, for example at
flea markets, craft fairs, etc.
Drawbacks:
16
In the digitalized world, it is forecasted that the payment value that is stored in
digital form causes a wind of change.
Together with the increasing number of smartphone users, there are more and
more QR code payments to be made. QR, or Quick Response, is a square bar
code that is digitally created and valid to pay after scanning. There are two ways
to perform scanning with QR code:
Despite its simplicity, this payment method can expose some security holes,
mostly related to malware QR code that can contain malware or Trojans.
Drawbacks:
• Security issues: NFC is prone to man-in-the-middle attacks. Hackers can
establish a specific key to perform eavesdropping or data modification. RF
signal can be picked up with an antenna and exposed to possible relay
attack.
• Incompatible hardware: If vendors do not integrate NFC into their
devices, consumers are not able to pay with this technology.
• Data privacy: Because credit card information is stored on the phone,
phone hacking could expose this sensitive payment data.
Sound wave, or signal wave is a new technology that works on various devices
such as smartphones, swipe cards and POS terminals. Sound wave payment
enables contactless payment by transmitting data through soundwaves.
19
Soundwaves will be sent from the POS terminal to mobile phones and these
signals will be later converted into analog. (Comviva 2016.)
The benefits and drawbacks that Sound wave payment introduces are as below:
Benefits:
• Compatibility: Sound wave payment is compatible with all hardware
devices.
• Support for a wide range of customers: Sound wave payment does not
require Internet access and any specific platform, therefore it can
approach more targeted customers.
• Low cost: Little or no extra cost for merchants will increase the adoption
rate
• Convenience: Easy to use, no complex interaction.
• Better customer experience: Better experience with real time updates.
• Effortless transactions: Quick, relevant and reliable payment data to be
processed.
• Security: Data is encrypted and and a secure channel is established to
transmit information.
MST picks out the best features of NFC and traditional card payment. People can
make use of the existing card reader without any software or hardware upgrade.
MST is demonstrated as secure as NFC, and safer than the traditional physical
card. This is considered a thorough alternative solution for mobile payment.
The ever-increasing number of cloud services during the last few years has led to
a new level of mobile payment. To make use of the convenience and simplicity of
cloud computing in payment systems, Google Wallet, Paypal, GlobalPay,
GoPago etc. developed the cloud-based approach for in-store payment.
This technology initiates two separate transactions, placing the mobile payment
provider in the middle of the transaction. Firstly, users are free to select a cloud-
linked method and authorize the payment, usually via NFC. The charge will be
automatically covered by the payment provider. In the second transaction, the
payment provider gets the fee back from the purchaser’s cloud-linked account.
(ACCEO Tender Retail Team 2017.)
Drawbacks:
• Security in local phone system: Cardholder’s information is stored
locally in phone memory.
• Compliance: Sensitive data handling must be agreed upon by the issuers
and vendors.
Today, cloud-based mobile payments are applied widely in several places, for
example in refilling parking meter in San Francisco, car fueling and water service
provision in East Africa. Its global competitiveness thanks to cloud technology
can make a revolution in the mobile payment and telecom sector. Cloud-based
mobile payment aims to set consistent mobile payment standard and creates
strategic coordination across industries. (Emily 2018.)
Audio signal mobile payment introduces some noticeable benefits over its
drawback:
22
• Security: The server has entire control over the data to establish secure
channel.
• Low cost: No extra hardware is required.
Drawback:
• Noise interference can affect the data transfer.
In the future, audio signal mobile payment can be a potential low-cost solution for
m-commerce and will be put into use more widely.
Remote payment does not require direct interaction with merchant’s POS. Users
can complete transaction globally, independently of consumer’s or merchant’s
location. Remote payment is the essential and unavoidable payment method in
the digital world as the demand of human beings. It enables people to make
purchase or transfer funds without the physical distance. Moreover, security
problem is handled very well in remote payment technology.
There are several remote payment methods, all of which are highly evaluated
and adopted.
This mobile payment is the simplest one that has been invented in 1997 by Coca
Cola. The consumer can send a payment request via text message or an USSD
to a short code and successfully made the purchase. The fee will be charged to
their phone bill at the end of the month, reduce from prepaid balance or digital
wallet. The merchant applied this method will be informed once the transaction is
verified and release the goods.
deliver a variety of media content, ranging from image, video, audio, slideshow
with much more capability.
However, there are some drawbacks that occurs while this technologgy is
implemented:
• Content adaption: It is not always that the multimedia created by MMS is
entirely compatible with the recipient’s mobile phone.
• Bulk messaging: Containing the media means that MMS will consume a
large amount of bandwidth that can cause traffic over-the-air overhead.
• Security: The encryption of SMS/USSD is only provided until the radio
interface, then the message is plain-text, which make it vulnerable to some
security attacks.
• Poor reliability: Transactional SMS can easily fails as messages get lost
• Slow speed: Merchants take hours to receive the verification from
recipient.
• Low payout rate: There are many high cost associated and operator
estimate low payout rate, at about 30%.
During time, SMS-based Mobile Payment has gradually died out due to these
severe limitations.
24
Mobile banking is not a new concept in the 2020s. At this time, most of all
banking branches release their own mobile banking app, enable customers to
keep track of personal financial status, money transfer, paying bills and all sorts
of payment service. The wave started in certain countries like Sweden (Swish)
and UK (Barclays) and has spread worldwide.
Benefits:
• Constant updates in customer experience: The mobile app features will
play a key role in new customer’s adoption.
• Convenience: You can access your bank account anywhere along with
your mobile phone.
• Time-saving: No need to book appointment or go to ATM to perform
transactions.
However, there are still concerns about security issues within the bank software
development team.
The customer select mobile billing checkout at an e-commerce site. After two-
factor authentication including PIN and One-Time-Password being provided, the
purchase is made and the charge is applied to the customer’s mobile bill. This
kind of billing was most popular in 2012, when Ericsson and Western Union
cooperated to release Western Union Mobile Money Transfers. Making use of its
international advantages of both companies, the partnership aimed at building
relationship between m-commerce and the financial market.
• Security: Threat protection and fraud prevention has been taken care of
thanks to two-factor authentication engine.
• Convenience: No pre-installed or registration is required to proceed.
• Speed: Transactions can be complete within seconds.
The biggest drawbacks until now is the limit of value and type of goods that can
be purchased.
26
After studying about various types of mobile payment, each with individual
application and security technology, we can have a summary of comparison
between the traditional payment and the mobile payment. The table below shows
advantages and disadvantages regarding two payment systems respectively.
Mobile Payment Traditional Payment
Simplicity: easy, friendly-use Straightforward payment:
application immediate, no device failure,
errorless payment
Convenience: No need to have Security: bank institutions
separate cash, cards for risky are known to be highly
pocket, now consumers can secure in data protection
have all in one mobile phone.
Accessibility: Easy access to High approach: cash can
ready platform like smartphones be used in remote and less
developed area
Low cost: no extra cost as No additional fee service
card-maintain fee with cash
Advantages
Improve customer
experience: The UX/UI design
for mobile webs and
applications are focused and
tested to get better user’s
feedback.
Security measures are
constantly added
From the tables above, we can see that despite some minor disadvantages,
mobile payment are an outstanding alternative to offer convenience, security and
simplicity to make the purchase or perform financial transaction.
28
In the next chapter, we will have deeper research on the security mechanism that
have been used in Mobile Wallet system and all security threats that can be
found regarding all stakeholders in the Mobile Wallet ecosystem.
In the tech-savvy era that we live in, security is the biggest concern regarding all
services. As everything is provided in the form of digital, security becomes the
critical weakness among other features, especially when it comes to payment.
Therefore, the 3rd chapter includes deeper knowledge about various security
features to be implemented in Mobile Wallet. Also, the research introduces
common security threats to be analysed within the security threat model,
involving all digital wallet stakeholders. From this section, we can have a brief
overview of the Mobile Wallet ecosystem.
Payment is a crucial area that security must be applied and taken throughout the
entire process. Mobile users are, obviously, the fascinating target for stealing
information. Attackers try to exploit those vulnerable security holes, perform
identity theft, get access to sensitive data, make illegal changes to the bank’s
database, and bring up uncountable loss to the financial state. We can name a
few widely known case, when the weakness in security leads to enormous
damage: Mobile payment security gaps exposed at Hong Kong university
(Raymond 2017), Security Flaws at AT&T, T-Mobile and Sprint (Andrew 2018),
Data breech exposed 1 million prepaid T-Mobile customers (PYMNTS 2019).
Along with the rapid growth and dominant of mobile development, a lot of
research work has been invested to improve IT infrastructure in general and
mobile application security in particular. The Information Technology field
witnessed successful innovation, ranging in different services, especially in the
digital wallet area.
29
3.2 Authentication
• User’s knowledge: something the users know, for example their PIN
code, password, answer to profile information, etc.
• User’s physical characteristic: something unique that can prove who the
users are (biometrics), for example their fingerprints, face ID, etc.
• User’s possession: something that only users have, for example, a
security token, a key, etc.
People encounter many authentication challenges in their daily life, not only in
mobile payment. Some easy examples include unlocking mobile phones, logging
in to accounts in a website, withdrawing money from an ATM, ID registration, or
just as simple as receiving a parcel.
30
Passwords have been used for a few decades until 1980s, so have the
technologies to bypass it. More and more digital system tools were leveraged to
abuse passwords, even the longest passwords to be generated. A new
authentication technique was just about the matter of time, and that is how One
Time Password emerged. In 1984, to be exact, Security Dynamics Technologies,
Inc. invented a methodology that produced one-time password with a time-based
method from a special hardware device. (Emir & Mehmet 2019.)
The release of OTP solved the biggest problem of static passwords: they are
immune to replay attack. Even if the attacker manages to get the password from
another service or transaction, they are not able to login again with that expired
OTP. OTP made a huge advantage to reduce attack surface. The payment
system is not easily impersonated without the unpredictable data.
31
However, there are some limitations of OTP that might affect the whole system,
according to Security Awareness 2019, including the following:
Despite the above drawbacks, OTP is forecasted to gradually replace all static
passwords to strengthen security systems due to its convenience (Gemalto
2020).
3.2.2 Tokenization
The concept of tokenization has emerged long ago in the history, when people
started thinking about how to secure and reduce risk of high value financial
transactions. Payment Card Industry Data Security Standard (PCI DSS) has strict
compliance of credit card data storing security. Therefore, tokenization met the
requirement of PCI to protect the cardholder’s data.
Token service provider randomly generates the surrogate value that is converted
from credit card information. In the case of payment card data, customer can
insert the token to complete authorization request instead of the card number.
Combining with NFC or EMV technology, the token is then stored in the merchant
32
Tokens are implemented in almost all multi-factor authentication service, and will
be put more into use in the future of authentication.
33
3.2.3 Biometrics
• Voice Recognition: The acoustics features of the voice are recorded and
translated in the speaker recognition system to distinguish individuals.
Voice recognition is applied in device intelligent assistant, translation,
making phone call, payment transaction.
3.3 Cryptography
Symmetric Encryption, or Private Key Encryption is the algorithm when the same
key is used for both encryption and decryption. The usual length of symmetric
key is less than 128 bits. The key is created by pseudo random generator (as
random as possible) to ensure best security. Since the keys are identical, they
should always be a shared secret between all parties. Otherwise anyone
receiving the key would be able to decrypt the private message.
Symmetric key can be stream ciphers or block ciphers. Stream ciphers process
data at one bit/byte at a time, meanwhile block ciphers process data in data
blocks. We will focus on block ciphers in relation to mobile payment.
DES
Data Encryption Standard (DES) was developed by IBM in the 1970s but was
later adopted by NIST. It has a 64-byte block size and use a 56-bit key to
generate the encrypted message. DES is vulnerable to brute force attack if a
36
weak, short key is used. It is already publicly broken in 22 hours and 15 minutes
by EFF in 1999. (Paul 2001.)
3DES
3DES is an implementation of DES to prevent feasible brute force attack. 3DES
applies 3 DES algorithms in each block, numbering encryption with key 0,1 and
2. 3DES triples the key size of DES to protect against attacks, without changing
the block algorithm.
AES
One of the most common standards for Symmetric Encryption and successor of
DES is Advanced Encryption Standard (AES). It was originally developed by
Joan Daemen and Vincent Rijmen in 1988. In 2001, National Institute of
Standards and Technology (NIST) officially approved AES in commercial
(Federal Information 2001). AES supports many combinations, including AES-
128, AES-192, and AES-256 (according to the bits key length). AES utilized the
4x4 matrix with many cell (each contains 1 byte) forming a block (16 bytes). AES
is considered as almost unbreakable, large enough data block and recommended
to use.
The recipient’s public key is established to encrypt the message, but only the
receiving parties who possess their private key is able to read the encrypted
message. They key generation contains mathematical calculations so that one
key cannot used to predict the other one. This one-way function ensures the
confidentiality, as only the owner of the private key and associate who has public
key are involved.
RSA
RSA (Rivest–Shamir–Adleman) is a widely applied public key cryptosystem in
securing data transmission. It is invented in 1977 and named after its three
inventors. RSA is one of the first and best known for public key data block
encryption.
RSA is based in the factorization of 2 prime numbers to generate the public and
private keys, ranging from 1024 to 4096 bits. The sender encrypts the message
with the recipient’s public key, and only the private receiver’s key can decode the
message.
RSA contains many vulnerabilities. A small value of 2 prime numbers will produce
a too weak key encryption process. It is possible for attackers perform probability
attack. On the other hand, large value will consume a lot of time and effort
compared to other encryption mechanisms. Due to many flaws in its algorithm,
RSA is not directly applied in cryptography, but combined with symmetric
38
encrypted shared key to increase the complexity and security of bulk encryption-
decryption level.
PKI applications go beyond user ID and authentication, but also Digital Signature,
Digital Certificate, SSL/TLS, etc. PKI makes a big contribution by supporting
authentication in smartphone, game console, ticketing, mobile banking in
particular and e-commerce in general.
Hash Function
Hash Function is also Public key cryptography. Hash function is a mathematical
calculation that converts the input data (Key) into a fixed-length hash code. The
input can have variable sizes but Hash Function always produce a fixed-size
value, indexing a hash table or records. Since the hash is usually much smaller
than the input data, it is also known as digest. (Tutorials Point.)
There are some popular Hash Functions that is widely used currently.
SHA-1 has been widely imported in security applications and protocols, for
example in Secure Socket Layer (SSL). Throughout the time, NIST released
SHA-2 and SHA-3 with extended input length.
Whirlpool
Whirlpool is the latest Hash Function cryptographic system. It was first introduced
in 2000 by Vincent Rijmen, creator of AES. Whirlpool returns 512-bit hash
message, which is an improvement in data length. Until now, 3 versions of
Whirlpool have been released, namely WHIRLPOOL-0, WHIRLPOOL-T, and
WHIRLPOOL. It is likely that Whirlpool will be more common in the near future of
Hash Function.
The biggest threat to cryptography is the brute force attack, where the hackers try
to input all possible key combination. The length of the key is exponentially
proportional to the strength of the encryption. Thanks to advanced technology
nowadays, the more complex the encryption, the more secure it is, probably
taking a few billion years to decrypt the message.
Mobile payment with digital wallet is a large ecosystem that consists many
stakeholders. In order to maintain the function of any system, the ecosystem
must include parties that take part in all activities, from the beginning till the end.
Each stakeholder is a basic component of the mobile payment system and plays
an irreplaceable role during the transaction. They are identified as the following
diagram (ENISA 2016):
41
Card issuer: The bank and financial institutions are corporations that offers
banking and financial services such as open a bank account, issue personal card
payment, validate card data, authorize and complete transactions, partner with
payment service providers, etc.
42
Card Acquirer: The banks and financial institutions also provides card payment
processing, authorization to/from the Issuer.
Payment Service Provider: is the stakeholder that provider payment service for
merchants to serve digital wallet payment within POS’s terminal, like WorldPay,
etc.
Merchant: is the party that offers and sells products or services directly to the
customers. Customers will make the purchase with this party. Merchant is the
host of POS terminal.
SET also enhances the security in mobile payment (Saleem & Muhammad 2007),
including
• Authentication
• Authorization
• Confidentiality
• Integrity
• Non-repudiation
1. Consumers access the merchant’s web site, browse the goods and selects
what they want. They will get the total cost of all chosen items including
taxes and shipping costs.
2. Consumers choose the payment method to proceed with
3. After getting details of customer’s payment, the merchant contacts the
merchants bank for customer authorization
4. Merchant Bank will contact the customer’s bank to get payment approval
5. The transaction will be complete if authorization is correctly conducted
6. A few seconds later, there is a confirmation to the customer that this order
has been processed.
Maintaining a SET mobile payment process is the top criteria in developing digital
wallet application.
The table below shows the most common security threats and the prevention
from each stakeholder’s perspective (ENSA 2016):
Mobile
Payment Potential Threat Security Measures
Stakeholder
Phishing: • Security awareness
• Public Wi-Fi network • Keep phone updated
User
• Media attachment • Do not use public Wi-Fi for
mobile payment
Unauthorized access • Strong PIN
Mobile control: Weak PIN • Biometrics authentication
device factors: face ID, fingerprint,
etc.
44
We can detect the security threats that might be exploited from the table above
and follow the security measures to avoid exposing security holes and
vulnerabilities to attackers. This can be applied for users, mobile application
developer, merchant, Payment Service Provider, etc.
Following MOMO website, MOMO is an e-wallet and payment app that allows
users to make purchases online and transfer money digitally in various platforms:
POS, Desktop, Website and Pay in bill. MOMO offers various services, including
nationwide cash transfer, support more than 100 types of bill charges, recharge
mobile phone bills, pay personal loans, purchasing software licenses, online
game cards, taxi payments, flight and movie tickets. The figure below shows the
picture of e-commerce payment method used in Vietnam.
47
Apparently, digital wallet is slowly adopted (19% of the total value) in Vietnam
and has the tendency to be preferred among others.
From MOMO website, MOMO developed from a Fintech startup company that
develops digital wallet application for iOS and Android devices in 2007. Following
the affluent success of giant Asian tech companies like Tencent’s WeChat,
Indonesia’s Go-Jek and Singapore’s Grab, MOMO has risen to become a notable
mobile payment service provider. The company partners with 24 domestic banks
and major foreign payment organizations like Standard Chartered, JCB,
MasterCard and Visa. There is estimated to be about 10 000 merchants in
diverse fields such as e-commerce, transportation, entertainment, utility,
consumer shopping in cooperation with MOMO. Some achievements to be listed
48
that MOMO team has successfully gained throughout the time, such as the
following:
What sets it aside from other applications from any banks is that they acquire
users with nonstop development for the best customer experience (UX design).
The company’s vision is to make a revolution promoting cashless payment in
49
Vietnam. Though ambitious, there are many persuasive evidences that MOMO
can make it happen in the near future. (Fintechnews Vietnam 2019.)
MOMO commits to Mobile Money Security of State Bank of Vietnam (SBV) under
the act of Decree 101/2012, General financial services, Bank regulator and
Global System for Mobile Communications (GSMA) Association (Asia Tech Daily
2019). MOMO dedicates to try their best implement the Mobile money security
system and ensure user’s data privacy. R&D team at MOMO invest much time
and expense to deliver most updated high secure technology. This factor has an
enormous impact in attracting new app adopters and maintaining MOMO’s good
reputation. Users can be ease to know that MOMO are applying many
outstanding and superior security technologies (MOMO security website), which
are thoroughly introduced and evaluated in the next session.
Users must provide user-defined information (for example password, PIN) and
information that users receive from the service provider (OTP, Token, Grid card)
in order to complete their requests. The OTP code is sent via SMS to your
MOMO Wallet registration phone number. 2FA applies when users register a new
account or device, log in and complete a financial transaction. To tighten the
security level, MOMO enables warnings against any irregular or suspicious
logins, activities and transactions.
50
With two factors combined algorithm, hackers will not able to fully steal the
information needed to penetrate the user account, therefore increases the
security level. Moreover, MOMO also integrates modern biometrics
authentication such as Fingerprint and Face Recognition to authenticate users.
4.2.2 Tokenization
Tokenization is a security solution that major credit and financial institutions have
applied when issuing payment cards to their customers. It is already mentioned in
section 3.2.2 that tokenization is a technology which automatically encrypts the
cardholder’s details into token code. Instead of storing the customer’s payment
card data, only the token is recorded in the system.
By this way, data privacy is protected against data breach. Attackers are not able
to access the actual card data since token is only valid for a particular transaction
only and cannot be used out of this scope.
"amount": "150000",
"orderInfo": "SDK team.",
"requestId": "MM1540456472575",
"extraData": "email=abc@gmail.com",
"signature":
"996ed81d68a1b05c99516835e404b2d0146d9b12fbcecbf80c7e51df51cac85e"
}
Data Processing:
partnerCode=MOMO&accessKey=F8BBA842ECF85&requestId=MM1540456472575&amoun
t=150000&orderId=MM1540456472575&orderInfo=SDK
team.&returnUrl=https://momo.vn¬ifyUrl=https://momo.vn&extraData=emai
l=abc@gmail.com
Secret Key: K951B6PE1waDMi640xX08PD3vg6EkVlz
var signature = HmacSHA256(data, secretkey);
console.log(signature);
RSA Encryption is introduced in section 3.2.2.2. RSA uses a public key and
private key to encrypt and decrypt the data while transmitting. Partner uses public
key provided by MOMO to encrypt the data in MOMO's format, MOMO uses
private key to decrypt (Developers MOMO Docs 2019). Below is an example of
data encryption by RSA in MOMO service.
4.2.5 SSL/TLS
SSL (Secure Socket Layer) and TLS (Transport Layer Security) are cryptographic
protocols that aim at protecting data transmission via networks (such as the
Internet). SSL/TLS ensures the communication security for connections between
a client (web browser) and a web server:
MOMO Payment Platform API is a payment solution for business units, allowing
customers to use MOMO E-Wallet account to pay for services on various
platforms: Desktop Website, Mobile Website, Mobile Application, POS, Pay In
Bill, In App MoMo (Developers MOMO Docs, 2019).
There are 4 primary payment methods that MOMO supports: Payment Gateway
(All-in-one), App-In-App Payment, POS Payment, QR Code Payment. Each
payment method uses separate API platform.
We go through the theoretical part about MOMO security system in the previous
section. In order to analyze and examine the security technologies mentioned
above, I will perform the practical part using different frameworks and network
analysis tools.
After researching, I have decided to take OWASP as reference for laying issue
foundation. OWASP is a standard awareness documentation for developers and
web application security. OWASP aims to improve software security through its
community-based sharing knowledge, open source projects, material related and
tens of thousands of members. OWASP guidelines present the top security
criteria that are most concerned. By adopting this documentation, companies and
55
developers can build a more secure application and minimize security risks.
(OWASP Top Ten 2020.)
The security testing will be conducted using many techniques and security
frameworks to evaluate the effectiveness of security features that are
implemented in MOMO Mobile Wallet. Following the security guidelines defined
from OWASP Top 10, we can check and assure that the best security practices
are applied.
The security tests are presented with specific aim, category, preparation needed,
the experiment conducted and conclusion from the result. Although the tests do
not cover all security threats as in the guidelines, it contains some tests that can
check common security holes that can directly do harm to the end users.
The aim of this test is to check if the NFC tag identifier is encrypted so that the
transaction process is secure (Related to the 3rd threat).
The test requires two Android smartphones, one is installed with MOMO, the
other one is installed with an NFC Reader application.
The experiment is done with two different devices. One serves as the customer’s
own device with MOMO wallet installed. The other one acts as the hacker’s
phone without MOMO application. A payment code is generated on the
customer’s phone that will carry information for payment as if the customer is at
the counter. However, the attacker’s smartphone could not read the payment
code with a normal NFC reader due to the lack of unknown tag identifier. The
transaction was not processed (see Figure 11 below).
58
The conclusion was that this security test proved NFC communication cannot not
be intercepted to steal credit card information from the customer’s mobile wallet.
The aim of this test is to use a network protocol analyzer to monitor packets
going through the application, in order to inspect the security level of the software
(Related to the 3rd threat).
The test requires an Android smartphone device, Wireshark software to run on
the computer, Packet Sniffer application (a software designed specifically for
monitoring and capturing packet on an Android device, the same as Wireshark).
When working with Wireshark, the steps to be carried out are as below:
59
When working with Packet Sniffer, the steps to be carried out are as below:
• Install Packet Sniffer software on the device (with VPN Certificate).
• Press the start button to capture packet going through.
• Choose the app you would like to monitor. In this scenario, we want to
examine packets going to and from MOMO.
• Perform some activities in MOMO app, for example, logging in, checking
the account balance, requesting to pay, etc.
• Then stop the capture and check for the packet that the software had
inspected.
• The activities have been captured and we can see some information such
as IP address, time, TCP protocol request as in Figure 14. However, we
60
can see that from Figure 15, all the information is encrypted and could not
be viewed in plain text.
It is concluded that after analyzing the packet, we could not retrieve any highly-
sensitive information or any password presented in plain text. The data
transmission is correctly encrypted and does not expose any vulnerabilities.
The aim of this test is to check the validity of QR code (Related to the 4th threat).
The test requires generating an invalid QR code from https://www.qr-code-
generator.com/ to represent a text content as in Figure 16 below.
Later, try to scan this invalid code to get response from the MOMO wallet. The
result is that MOMO wallet detected this as invalid formatted. Figure 17 below
shows the following: “QR code is invalid. Please try again.”. Therefore, malicious
and invalid QR code could not be used to proceed the transaction.
The test requires one Android Smartphone with MOMO installed to conduct
logging in and perform financial transaction.
63
Throughout the experiment, PIN, Face ID or Fingerprint are requested every time
user logs in to the phone and performs a financial activity, such as making a
purchase, transfer money, etc.).
The aim of this test is to inspect authorization process (Related to the 4th threat).
Let’s try to login to the same MOMO account on multiple devices at the same
time. Providing that the correct OTP were inserted, after successfully logged in to
the second device, there will be a popup window warning about the login to a
new device. We will be no longer able to access the MOMO wallet on the first
device.
The figure below indicates a security warning while logging to the same MOMO
account on a different device. It says: “Your MOMO account was logged in to
device SAMSUNG SM-A730F at 16:49:35 on 08/03/2020. If this activity is against
your wish, please contact MOMO urgently for security support. Thank you.”
64
The aim of this test is to verify the security mechanism that has been stated to be
applied in MOMO application (Related to 5th threat).
The test requires an Android smartphone device with APK Analyzer installed.
65
Start the APK Analyzer and choose application target as MOMO. The APK
Analyzer will return the security mechanism and encryption that are currently in
use as in Figure 19.
The conclusion was that encryption Algorithm used is MD5, SHA with RSA
signature, same as what MOMO has provided before.
The aim of this test is to validate the existence of input to sensitive field on mobile
application (Related to the 6th threat)
The test requires an Android Smartphone with MOMO installed and ready to log
in for the first time.
66
For this threat, the validation of sensitive fields when logging in to MOMO is
tested. Try to login from different smartphones and test with all open fields
(registered phone number, password). During the next step, when connecting the
digital wallet with a bank account, it is also required for correct information to
proceed. All incorrect details will cause errors in the screen.
The conclusion was that in every tested flow, the fields are validated. The
security mechanism is effectively implemented.
6 FUTURE TECHNOLOGY
6.1 Opportunity
The rapid growth of mobile users is beneficial for mobile payment to become
even more popular (2.07 billion users worldwide) (Alex 2019). Smartphones are
now extended to payment systems, apart from communication and social media.
It is recorded in IT Intelligence Market that four out of tens users make purchases
with their phones, doubling the number of mobile payment users during the last
three years (Viktoria 2019). Many attempts have been made to be ready for the
replacement of traditional payment by mobile payment within the last decade. Big
players in the mobile market such as Apple, Samsung, Google and PayPal did
not fall behind the trend (Figure 20). They keep releasing better versions of digital
67
Below are a few technologies and improvements that are awaited to make
enormous changes in the online commerce (Tranglo 2019):
6.2 Challenge
• Regulation and compliance: These have always been hot topics since
the dawn of mobile payment development. Governments and banking
organizations must implement legal requirements for payment service
providers to bind with.
• Fraud prevention: Customers can be reluctant to adopt mobile payment if
it presents risky matters, for example leaked data, device failure and
errable transactions.
• Security issue: This is the biggest concern of consumers when deciding
on mobile payment adoption. Too many intermediates can expose
70
7 CONCLUSION
The study covers theoretical study on different topics related to mobile payment
service, as well as the technology commonly used to ensure the security of
mobile payment in general and digital wallet in particular. The theoretical topics
presented were investigated thoroughly and provide sufficient knowledge of (i)
different types of mobile payment in terms of technology, advantages and
disadvantages, (ii) the benefits and drawbacks of mobile payment in comparison
to traditional payment, (iii) the threat model associated with all stakeholders
involved in the mobile payment, (iv) security measures towards each stakeholder
and (v) OWASP Top 10 of Mobile Threats as discussed in the first chapter. The
theory part of this thesis explored deep understanding of mobile payment and
digital wallet security threat, therefore laid a good foundation for initiating the
practical part.
Thanks to the background knowledge gained from the theory part, the security
testing was conducted in March 2020, focusing on MOMO’s security mechanism.
The tests mostly related to the wireless communication technologies that are
currently implemented in the system. In order to specify the security tests, the
common threats were predefined from the security ecosystem and measures of
each stakeholder (section 3.4) and classified into categories, which were
referenced from OWASP Top 10 (section 4.3).
71
As a result, seven threats were indicated and a possible security test was
performed on each individual threat. The tests allow us to discover any issues
regarding MOMO security system for the digital wallet application on mobile
phone. These include: Interception of NFC communication in order to gather
credit card information of the consumer, Interception communication of the
mobile appication, Testing against reading malicious QR code, Verify the
effectiveness of two-factor authentication, Secure login to the same account in
multiple devices at the same time, APK cryptography verification, and Validation
of sensitive fields on mobile application. The threats identified falls into categories
3,4,5 and 6 in the OWASP Top 10. The security tests were well-prepared and
conducted. However, if there are more resources and time to be spent, the cloud
infrastructure and API of MOMO application can be investigated thoroughly.
After the tests, we can come to the conclusion that part of MOMO security
measures are examined and still functions properly to maintain MOMO digital
wallet security. The experiments were succesfully conducted and presented a
good result. MOMO security system was verified against malicious threats and
vulnerabilities. The security mechanism that is stated on MOMO’s website such
as Two-factor authentication, Tokenization, RSA Encryption, SSL/TLS Protocol
are correct and efficiently operated.
The objective of the thesis was achieved and able to determine the efficiency of
the security technologies that are applied by MOMO. At the end of the study,
some opportunities and challenges in the upcoming years were also introduced,
giving a positive signal for mobile payment industry. The thesis can be used as a
reference to contribute to later research on the constantly-developing mobile
payment service.
72
REFERENCES
Aite Group 2016. The Evolution of Digital and Mobile Wallets. WWW document.
Available at: https://www.paymentscardsandmobile.com/wp-
content/uploads/2016/10/The-Evolution-of-Digital-and-Mobile-Wallets.pdf
[Accessed 1 Mar 2020].
Alex R. 2019. Mobile wallet trends annual report 2019. WWW document.
Available at: https://www.paymentscardsandmobile.com/mobile-wallet-trends-
annual-report-2019/ [Accessed 9 Apr 2019].
Alfred 2019. The Future of Mobile Wallets: Opportunities and Challenges for the
Wallet Integration. WWW document. Available at:
https://www.dotcominfoway.com/blog/opportunities-and-challenges-for-the-wallet-
integration/#gref [Accessed 14 Sep 2019].
Asia Tech Daily. 2019. Momo-The Rising Star of Vietnam Online Payments.
WWW document. Available at: https://www.asiatechdaily.com/momo/ [Accessed
13 Feb 2019].
Bill C. 2018. Here's Why Mobile Payments Are The Future Of Commerce. WWW
document. Available at: https://www.inc.com/bill-carmody/heres-why-mobile-
payments-are-future-of-commerce7.html [Accessed 11 Jan 2018].
Bryan B. 2019. Digital Cash is Here, say Goodbye to your Wallet. WWW
document. Available at: https://medium.com/mobiletopup/digital-cash-is-here-say-
goodbye-to-your-wallet-ec57b2c48058 [Accessed 30 Jan 2019].
Comviva. 2016. What Are Sound Based Payments? WWW document. Available
at: https://blog.comviva.com/what-are-sound-based-payments/ [Accessed 2 Jun
2016].
Corey N. 2018. Digital authentication: The past, present and uncertain future of
the keys to online identity. WWW document. Available at:
https://www.geekwire.com/2018/digital-authentication-human-beings-history-trust/
[Accessed 22 Sep 2018].
Deloitte. 2019. Chasing cashless? The Rise of Mobile Wallets in the Nordics.
Available at:
https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/financial-
services/Downloads/Chasing_Cashless-
The_rise_of_Mobile_Wallets_in_the_Nordics.pdf [Accessed 10 Jan 2019].
Developers MOMO Docs. 2019. About MOMO API. WWW document. Available
at: https://developers.momo.vn/#/docs/en/?id=about-momo-api [Accessed 1 Mar
2020].
Dierks T., Rescorla E. 2008. The Transport Layer Security (TLS) Protocol
Version 1.2. Available at: https://tools.ietf.org/html/rfc5246 [Accessed 1 Mar
2020].
Emir H. 2017. Dynamic Rule Encryption for Mobile Payment. Available at:
https://www.hindawi.com/journals/scn/2017/4975302/ [Accessed 26 Jan 2017].
Gemalto. 2020. One Time Password (OTP). WWW document. Available at:
https://www.gemalto.com/companyinfo/digital-security/techno/otp [Accessed 13
Feb 2020].
Guo J. 2016. MBA Thesis-The Growth & Future of Mobile Payments. Available
at: https://scripties.uba.uva.nl/search?id=623960 [Accessed 1 Mar 2020].
Jaime T. 2019. Banking & Payments for Gen Z Report: The winning strategies for
attracting the next big opportunity — Generation Z. WWW document. Available
at: https://www.businessinsider.com/banking-and-payments-for-gen-z?IR=T
[Accessed 2 May 2019].
John R. 2016. The evolution of the mobile payment. WWW document. Available
at: https://techcrunch.com/2016/06/17/the-evolution-of-the-mobile-payment/
[Accessed 17 Jun 2016].
Larke W. 2018. Norway and China in front with mobile payment. WWW
document. Available at: https://scandasia.com/norway-and-china-in-front-with-
mobile-payment/ [Accessed 23 Nov 2018].
Maria V. 2019. Digital Wallet Users Could Double by 2020. WWW document.
Available at: https://www.statista.com/chart/19972/digital-wallet-users-double-
2020/ [Accessed 15 Nov 2019].
75
Matthew H. 2012. Pre-1900 utopian visions of the ‘cashless society’. Available at:
https://mpra.ub.uni-muenchen.de/40780/ [Accessed 26 Sep 2019].
PYMNTS. 2019. T-Mobile Data Breach Puts Personal Data Of 1M+ Customers At
Risk. WWW document. Available at: https://www.pymnts.com/news/security-and-
risk/2019/t-mobile-data-breach-puts-personal-data-of-1m-customers-at-risk/
[Accessed 24 Nov 2019].
Ryan R. 2014. Cash Is Trash: The Future of Mobile Payment. WWW document.
Available at: https://www.forbes.com/sites/techonomy/2014/01/23/cash-is-trash-
the-future-of-mobile-payment/#2e8a06671596 [Accessed 23 Jan 2014].
Security Awareness. 2019. What are one-time passwords and their pros and
cons? WWW document. Available at: https://resources.infosecinstitute.com/one-
time-passwords-pros-and-cons/#gref [Accessed 8 Jul 2019].
The Gale Group Inc. 2014. Retina and Iris Scans. Encyclopedia of Espionage,
Intelligence, and Security. [Accessed 1 Mar 2020].
Viktoria T. 2019. Tapping into the Future of Mobile Payments. WWW document.
Available at: https://blog.globalwebindex.com/chart-of-the-week/future-mobile-
payments/ [Accessed 26 Mar 2019].
Appendix 1/1
MOBILE WALLET ALTERNATIVES ANALYSIS
Below is the table that contains the comparison between the most common digital
wallets to be used worldwide, regarding their category, technology, opportunity
and risks. This table can be used as a useful source of reference in mobile
payment.
Figure 22. Mobile Wallet Alternatives (Aite Group)