HomeCII/OTBackdoor in Contactless Key Cards Allows for Mass Cloning

Backdoor in Contactless Key Cards Allows for Mass Cloning

Published on

spot_img

A recent discovery by French cybersecurity firm Quarkslab has revealed a critical security flaw in millions of contactless key cards used worldwide for office and hotel access. These cards, equipped with chips manufactured by Shanghai Fudan Microelectronics Group, are now vulnerable to a hardware backdoor that could potentially allow attackers to clone them with ease, putting security at risk.

The vulnerability in question was detailed in a research paper by Quarkslab, shedding light on the presence of a hidden backdoor in chips commonly used in contactless access cards. Known as the FM11RF08S and FM11RF08 variants, these chips were intended to withstand traditional card-only attacks but were found to have a serious flaw that could be exploited by malicious actors.

The backdoor grants attackers the ability to clone cards in a matter of minutes, granting them unauthorized access to secure areas and compromising the overall security of the system. While the exploit does require physical proximity to the targeted card, the potential for mass exploitation exists if the supply chain is compromised, allowing for large-scale card cloning during manufacturing.

Quarkslab’s researchers uncovered a secret key embedded in the affected chips, accessible through the backdoor, that unlocks all user-defined keys on the cards. This means that any key on these cards can be compromised quickly by an attacker who is aware of the backdoor mechanism, regardless of individual diversification measures.

Experts in the field have highlighted the severity of this discovery, emphasizing the ease with which cards can be cloned and the potential ramifications for security. Patrick Tiquet, Vice President of Security & Architecture at Keeper Security, underlined the need for thorough security practices and careful scrutiny of components in the supply chain to prevent such vulnerabilities from being exploited.

For consumers and organizations using MIFARE Classic cards, it is essential to assess the risks posed by this security flaw and take immediate steps to mitigate them. Checking the type of card being used and considering an upgrade to more secure alternatives are crucial measures to safeguard against potential attacks.

This latest development serves as a reminder of the ongoing challenges in maintaining cybersecurity in today’s interconnected world. As technology evolves, so too do the tactics used by adversaries to exploit vulnerabilities in systems. Vigilance and proactive measures are key to staying ahead of potential threats and ensuring the security of sensitive information and access control systems.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...