Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Review (2025): CookUnity Prepared Meals

26 July 2025

Oppo Reno 14FS 5G Price, Design and Specifications Leaked Ahead of Anticipated Debut

26 July 2025

Do You Need a Barbecue Knife?

26 July 2025
Facebook X (Twitter) Instagram
Just In
  • Review (2025): CookUnity Prepared Meals
  • Oppo Reno 14FS 5G Price, Design and Specifications Leaked Ahead of Anticipated Debut
  • Do You Need a Barbecue Knife?
  • Review: Nemo Dagger Osmo Tent (2025)
  • Samsung Galaxy A07 Listed on Google Play Console With Design, Key Specifications: Report
  • The Texas Floods Were a Preview of What’s to Come
  • 60 Italian Mayors Want to Be the Unlikely Solution to Self-Driving Cars in Europe
  • Samsung Reportedly in Talks With OpenAI, Perplexity to Offer Gemini AI Alternatives on Galaxy S26 Series
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards
News

How Hackers Extracted the ‘Keys to the Kingdom’ to Clone HID Keycards

News RoomBy News Room9 August 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Finally, HID says that “to its knowledge,” none of its encoder keys have leaked or been distributed publicly, and “none of these issues have been exploited at customer locations and the security of our customers has not been compromised.”

Javadi counters that there’s no real way to know who might have secretly extracted HID’s keys, now that their method is known to be possible. “There are a lot of smart people in the world,” Javadi says. “It’s unrealistic to think we’re the only people out there who could do this.”

Despite HID’s public advisory more than seven months ago and the software updates it released to fix the key-extraction problem, Javadi says most of the clients whose systems he’s tested in his work don’t appear to have implemented those fixes. In fact, the effects of the key extraction technique may persist until HID’s encoders, readers, and hundreds of millions of keycards are reprogrammed or replaced worldwide.

Time to Change the Locks

To develop their technique for extracting the HID encoders’ keys, the researchers began by deconstructing its hardware: They used an ultrasonic knife to cut away a layer of epoxy on the back of an HID reader, then heated the reader to desolder and pull off its protected SAM chip. Then they put that chip into their own socket to watch its communications with a reader. The SAM in HID’s readers and encoders are similar enough that this let them reverse engineer the SAM’s commands inside of encoders, too.

Ultimately, that hardware hacking allowed them to develop a much cleaner, wireless version of their attack: They wrote their own program to tell an encoder to send its SAM’s secrets to a configuration card without encrypting that sensitive data—while an RFID “sniffer” device sat between the encoder and the card, reading HID’s keys in transit.

HID systems and other forms of RFID keycard authentication have, in fact, been cracked repeatedly, in various ways, in recent decades. But vulnerabilities like the ones set to be presented at Defcon may be particularly tough to fully protect against. “We crack it, they fix it. We crack it, they fix it,” says Michael Glasser, a security researcher and the founder of Glasser Security Group, who has discovered vulnerabilities in access control systems since as early as 2003. “But if your fix requires you to replace or reprogram every reader and every card, that’s very different from a normal software patch.”

On the other hand, Glasser notes that preventing keycard cloning represents just one layer of security among many for any high-security facility—and practically speaking, most low-security facilities offer far easier ways to get in, such as asking an employee to hold a door open for you while you have your hands full. “Nobody says no to the guy holding two boxes of donuts and a box of coffee,” Glasser says.

Javadi says the goal of their Defcon talk wasn’t to suggest that HID’s systems are particular vulnerable—in fact, they say they focused their years of research on HID specifically because of the challenge of cracking its relatively secure products—but rather to emphasize that no one should depend on any single technology for their physical security.

Now that they have made clear that HID’s keys to the kingdom can be extracted, however, the company and its customers may nonetheless face a long and complicated process of securing those keys again. “Now customers and HID have to claw back control—and change the locks, so to speak,” Javadi says. “Changing the locks is possible. But it’s going to be a lot of work.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleItel A50 Could Launch in India Next Week, Price Range Tipped
Next Article The best movie & show trailers of the week of August 9

Related Articles

News

Review (2025): CookUnity Prepared Meals

26 July 2025
News

Do You Need a Barbecue Knife?

26 July 2025
News

Review: Nemo Dagger Osmo Tent (2025)

26 July 2025
News

The Texas Floods Were a Preview of What’s to Come

26 July 2025
News

60 Italian Mayors Want to Be the Unlikely Solution to Self-Driving Cars in Europe

26 July 2025
News

Tesla Readies a Taxi Service in San Francisco—but Not With Robotaxis

26 July 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024103 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

Oppo Reno 14, Reno 14 Pro India Launch Timeline and Colourways Leaked

27 May 202582 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

The Texas Floods Were a Preview of What’s to Come

News Room26 July 2025
News

60 Italian Mayors Want to Be the Unlikely Solution to Self-Driving Cars in Europe

News Room26 July 2025
Phones

Samsung Reportedly in Talks With OpenAI, Perplexity to Offer Gemini AI Alternatives on Galaxy S26 Series

News Room26 July 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025125 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024103 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Review: Nemo Dagger Osmo Tent (2025)

26 July 2025

Samsung Galaxy A07 Listed on Google Play Console With Design, Key Specifications: Report

26 July 2025

The Texas Floods Were a Preview of What’s to Come

26 July 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.