How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

Cybersecurity News

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
SecurityHackingHacks
  • 📰 WIRED
  • ⏱ Reading Time:
  • 22 sec. here
  • 8 min. at publisher
  • 📊 Quality Score:
  • News: 33%
  • Publisher: 51%

A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.

HID Global's keycards—the company's radio-frequency-enabled plastic rectangles that are inside hundreds of millions of pockets and purses—serve as the front line of physical security for hundreds of companies and government agencies. They can also be spoofed, it turns out, by any hacker clever enough to read one of those cards with a hidden device that brushes within about a foot of it, obtain an HID encoder device, and use it to write the stolen data to a new card.

HID has since developed and released software patches for its systems that fix the problem, it says, including a new one that it intends to release “very soon” following the Defcon presentation. The company declined to detail what exactly this latest patch is for or why it was necessary after its previously released software updates, but stated that its timing is unrelated to the researchers' Defcon talk.

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

WIRED /  🏆 555. in US

Security Hacking Hacks Vulnerabilities Black Hat Defcon

United States Latest News, United States Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

3D genome extracted from 'freeze-dried' woolly mammoth3D genome extracted from 'freeze-dried' woolly mammothAbout 52,000 years ago, the skinned hide of a Siberian woolly mammoth was exposed to conditions so frigid that it spontaneously freeze-dried, locking its DNA fragments into place.
Read more »

Asylum Seeker's 'Ingenious' Hiding Place for Fentanyl, Heroin and CocaineAsylum Seeker's 'Ingenious' Hiding Place for Fentanyl, Heroin and CocaineCBP officers extracted 10 packages of drugs concealed within the muffler of the suspect's vehicle.
Read more »

Putin's Trader: How Russian hackers stole millions from U.S. investorsPutin's Trader: How Russian hackers stole millions from U.S. investorsThis CNBC documentary is about the rise and fall of Vladislav Klyushin and his business empire. Klyushin was just released from a U.S. prison in a prisoner swap.
Read more »

U.S. releases Russian hackers in Evan Gershkovich prisoner swapU.S. releases Russian hackers in Evan Gershkovich prisoner swapNBC News' Ken Dilanian has details on the prisoners released to Russia, including convicted assassin Vadim Krasikov, as part of the negotiations for the release of Evan Gershkovich and Paul Whelan.
Read more »

Iranian WiFi Attack—‘Reported Collapse’ As Israeli Hackers StrikeIranian WiFi Attack—‘Reported Collapse’ As Israeli Hackers StrikeZak is a widely recognized expert on surveillance, cyber and the security and privacy risks with AI, big tech, social media and smartphones. He is regularly cited in the media, with appearances on BBC, Sky, NPR, NBC, Channel 4, TF1, ITV and Fox. Zak has 25-years real-world experience in AI, cyber and surveillance.
Read more »

Warning Issued As Hackers Fake Google’s 2FA App To Steal Your DataWarning Issued As Hackers Fake Google’s 2FA App To Steal Your DataDavey is a four-decade veteran technology journalist and contributing editor at PC Pro magazine, a position he has held since the first issue was published in 1994. You can follow Davey on Mastodon, Twitter/X and most social networks as happygeek. Davey has spent more than 30 years as a freelance technology journalist.
Read more »



Render Time: 2025-02-28 18:50:42