Kuboid
Open Luck·Kuboid.in

Laundering Money

DEFCONConference2,108 views19:33over 1 year ago

This talk demonstrates physical security bypass techniques for commercial laundry machines, specifically targeting coin-operated payment modules. The speaker shows how to gain administrative access to the machines by manipulating internal wiring and using specialized lock-picking tools. The presentation highlights the vulnerability of legacy hardware to simple physical tampering and provides a practical guide for bypassing payment systems in a controlled environment.

Physical Access is Game Over: Bypassing Commercial Laundry Payment Systems

TLDR: This research demonstrates how simple physical tampering with Speed Queen commercial laundry machines allows for unauthorized payment bypass. By accessing the internal service panel and manipulating the coin-drop wiring, an attacker can trigger free cycles without any specialized electronic equipment. This highlights the critical failure of relying on security through obscurity in legacy hardware and the necessity of physical tamper-resistance in unattended payment terminals.

Security researchers often focus on remote code execution or complex web application vulnerabilities, but the most reliable way to compromise a system remains physical access. At DEF CON 32, Michael Orlitzky presented a masterclass in why hardware security is often an illusion, specifically targeting the CSC ServiceWorks payment modules found in thousands of apartment buildings across the United States. When the physical design of a device relies on nothing more than a standard lock and a lack of internal shielding, the entire payment model collapses.

The Mechanics of the Bypass

The target hardware consists of Speed Queen commercial washers and dryers retrofitted with third-party payment modules. These machines are designed to be serviced by technicians, which means they contain a service panel that is, in theory, protected by a lock. The vulnerability here is not a sophisticated exploit but a fundamental lack of physical tamper-resistance.

Orlitzky demonstrated that the payment module communicates with the machine's controller via a simple three-wire interface. When a coin is dropped or a payment is authorized, the module sends a signal across these wires to increment the machine's credit. By opening the service panel, an attacker gains direct access to these wires.

The attack flow is straightforward:

  1. Gain physical access to the service panel using a tubular lock pick or the appropriate manufacturer key.
  2. Identify the red, black, and white wires connected to the coin-drop mechanism.
  3. Short the relevant pins to simulate a coin drop.

For the washers, the wires are often terminated in a standard connector, making it trivial to bridge the connection using a simple paperclip or a piece of wire. For the dryers, which may lack a convenient connector, the technique involves stripping a small section of the insulation and manually touching the conductors together.

# Conceptual logic for the coin-drop signal
# The machine expects a momentary closure to register a credit.
# Bridging the signal wire to the ground wire triggers the increment.
# No software interaction or authentication is required.

Why This Matters for Pentesters

For those of us performing physical security assessments or red team engagements, this talk serves as a reminder that "unattended" does not mean "secure." If you are auditing a facility, do not ignore the laundry room or the vending machines. These devices are often managed by third-party vendors who prioritize ease of maintenance over security.

When you encounter these systems during an engagement, the risk is not just the loss of a few dollars in laundry fees. It is the precedent. If a vendor has failed to secure the physical interface of a payment module, they have likely failed to secure the backend communication or the data transmission between the machine and their central servers. An attacker who can bypass the payment mechanism can often move laterally to investigate how these machines report usage data, potentially uncovering insecure API endpoints or unencrypted traffic that could lead to a much larger compromise.

The Defensive Reality

Defending against this type of attack is difficult because the hardware is already deployed in thousands of locations. Retrofitting these machines with hardened enclosures or tamper-evident seals is expensive and logistically complex. However, the primary failure here is the reliance on security through obscurity.

Manufacturers and service providers must move toward designs that treat the internal wiring as untrusted. This means implementing cryptographic authentication between the payment module and the machine controller. If the controller only accepts signed commands from the payment module, shorting wires becomes useless. Until that happens, these machines will remain vulnerable to anyone with a screwdriver and a basic understanding of electrical circuits.

Moving Beyond the Demo

The most striking part of this research is how it strips away the complexity we usually associate with cybersecurity. There is no need for a zero-day, no need for a complex payload, and no need for network access. It is a stark reminder that physical security is the foundation upon which all other security controls are built. If an attacker can walk up to a machine and force it to perform an action it was never intended to do, the software-level protections are irrelevant.

If you find yourself in a position to influence procurement or security policy for a facility, ask the hard questions about the hardware being installed. Does the vendor have a documented process for physical tamper detection? Are the internal components shielded? If the answer is "no," you are not just buying a laundry machine; you are buying a liability. The next time you see a commercial appliance, look past the branding and consider the physical interface. The most interesting vulnerabilities are often the ones hiding in plain sight, waiting for someone to simply open the door.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in