Proxmark3 enables $10k Apple Pay exploit
A recent demonstration reveals how the Proxmark3 RFID research tool can be used to execute a sophisticated man-in-the-middle relay attack on Apple Pay. By spoofing "Express Transit" signals, attackers can trick locked iPhones into authorizing high-value transactions—up to $10,000—without user biometrics or passcodes, specifically targeting vulnerabilities in the Visa payment protocol.
This exploit isn't just a bug; it's a structural failure where the desire for seamless transit UX has trumped fundamental security handshake protocols.
- –The attack relies on "bit-flipping" the Card Transaction Qualifiers (CTQ) header to misidentify a retail terminal as a low-value transit gate.
- –While Mastercard utilizes asymmetric RSA cryptography to verify headers, Visa's protocol lacks this safeguard in certain offline-capable environments.
- –Proxmark3 serves as the essential hardware bridge, acting as a programmable NFC relay between the target phone and a rogue terminal emulator.
- –Apple and Visa have both deflected responsibility, citing "industrial legacy" and "zero liability" rather than overhauling the global transit infrastructure.
- –Developers should view this as a cautionary tale on the risks of allowing "trusted" shortcuts that bypass multi-factor authentication.
DISCOVERED
2h ago
2026-05-13
PUBLISHED
2h ago
2026-05-13
RELEVANCE
AUTHOR
Better Stack