
Mendoza says that all a thief needs to do in order to steal a Samsung Pay user's credit card is to stand near the checkout terminal with a smartphone that's running the interception app. This app eavesdrops on the NFC transmission and it steals the authentication token after the customer approves the purchase with a PIN code or fingerprint but before payment is actually processed. This brings up an error message on the customer's phone so they try to make the payment again.
This generates a second token which is then good for up to 24 hours. The thief can, in theory, use the stolen token anywhere in the world where it's possible to pay by NFC. Mendoza claims to have tested out this vulnerability at a grocery store. He adds that Samsung has been notified of this vulnerability, it's unclear whether it has been patched because Samsung hasn't commented on this matter as yet.