Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Review: Somnee Smart Sleep Headband

25 July 2025

Poco India Head Himanshu Tandon Departs Firm, Could Join Carl-Pei Led Nothing: Report

25 July 2025

Honor Pad X7 Price, Specifications, Features, Comparison

25 July 2025
Facebook X (Twitter) Instagram
Just In
  • Review: Somnee Smart Sleep Headband
  • Poco India Head Himanshu Tandon Departs Firm, Could Join Carl-Pei Led Nothing: Report
  • Honor Pad X7 Price, Specifications, Features, Comparison
  • Review: Samsung Galaxy Watch8 and Watch8 Classic
  • Honor Pad X7 With Snapdragon 680 SoC, 7,020mAh Battery Launched: Price, Specifications
  • Lava Blaze Dragon 5G – Price in India, Specifications (25th July 2025)
  • Anime Girl VTubers Are Selling Out Concerts, but Are They ‘Real’? Depends on Who You Ask
  • Lava Blaze Dragon 5G Launched in India With Snapdragon 4 Gen 2 SoC, 50-Megapixel Rear Camera
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
News

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

News RoomBy News Room9 August 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Finally, HID says that “to its knowledge,” none of its encoder keys have leaked or been distributed publicly, and “none of these issues have been exploited at customer locations and the security of our customers has not been compromised.”

Javadi counters that there’s no real way to know who might have secretly extracted HID’s keys, now that their method is known to be possible. “There are a lot of smart people in the world,” Javadi says. “It’s unrealistic to think we’re the only people out there who could do this.”

Despite HID’s public advisory more than seven months ago and the software updates it released to fix the key-extraction problem, Javadi says most of the clients whose systems he’s tested in his work don’t appear to have implemented those fixes. In fact, the effects of the key extraction technique may persist until HID’s encoders, readers, and hundreds of millions of keycards are reprogrammed or replaced worldwide.

Time to Change the Locks

To develop their technique for extracting the HID encoders’ keys, the researchers began by deconstructing its hardware: They used an ultrasonic knife to cut away a layer of epoxy on the back of an HID reader, then heated the reader to desolder and pull off its protected SAM chip. Then they put that chip into their own socket to watch its communications with a reader. The SAM in HID’s readers and encoders are similar enough that this let them reverse engineer the SAM’s commands inside of encoders, too.

Ultimately, that hardware hacking allowed them to develop a much cleaner, wireless version of their attack: They wrote their own program to tell an encoder to send its SAM’s secrets to a configuration card without encrypting that sensitive data—while an RFID “sniffer” device sat between the encoder and the card, reading HID’s keys in transit.

HID systems and other forms of RFID keycard authentication have, in fact, been cracked repeatedly, in various ways, in recent decades. But vulnerabilities like the ones set to be presented at Defcon may be particularly tough to fully protect against. “We crack it, they fix it. We crack it, they fix it,” says Michael Glasser, a security researcher and the founder of Glasser Security Group, who has discovered vulnerabilities in access control systems since as early as 2003. “But if your fix requires you to replace or reprogram every reader and every card, that’s very different from a normal software patch.”

On the other hand, Glasser notes that preventing keycard cloning represents just one layer of security among many for any high-security facility—and practically speaking, most low-security facilities offer far easier ways to get in, such as asking an employee to hold a door open for you while you have your hands full. “Nobody says no to the guy holding two boxes of donuts and a box of coffee,” Glasser says.

Javadi says the goal of their Defcon talk wasn’t to suggest that HID’s systems are particular vulnerable—in fact, they say they focused their years of research on HID specifically because of the challenge of cracking its relatively secure products—but rather to emphasize that no one should depend on any single technology for their physical security.

Now that they have made clear that HID’s keys to the kingdom can be extracted, however, the company and its customers may nonetheless face a long and complicated process of securing those keys again. “Now customers and HID have to claw back control—and change the locks, so to speak,” Javadi says. “Changing the locks is possible. But it’s going to be a lot of work.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleItel A50 Could Launch in India Next Week, Price Range Tipped
Next Article The best movie & show trailers of the week of August 9

Related Articles

News

Review: Somnee Smart Sleep Headband

25 July 2025
News

Review: Samsung Galaxy Watch8 and Watch8 Classic

25 July 2025
News

Anime Girl VTubers Are Selling Out Concerts, but Are They ‘Real’? Depends on Who You Ask

25 July 2025
News

The First Planned Migration of an Entire Country Is Underway

25 July 2025
News

The Age-Checked Internet Has Arrived

25 July 2025
News

Steam and Itch.io Are Pulling ‘Porn’ Games. Critics Say It’s a Slippery Slope to More Censorship

25 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024103 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Laptops

Lava Blaze Dragon 5G – Price in India, Specifications (25th July 2025)

News Room25 July 2025
News

Anime Girl VTubers Are Selling Out Concerts, but Are They ‘Real’? Depends on Who You Ask

News Room25 July 2025
Phones

Lava Blaze Dragon 5G Launched in India With Snapdragon 4 Gen 2 SoC, 50-Megapixel Rear Camera

News Room25 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025125 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024103 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Review: Samsung Galaxy Watch8 and Watch8 Classic

25 July 2025

Honor Pad X7 With Snapdragon 680 SoC, 7,020mAh Battery Launched: Price, Specifications

25 July 2025

Lava Blaze Dragon 5G – Price in India, Specifications (25th July 2025)

25 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.