| RFID used in product identification. Note the small size of the coil and chip. |
Unfortunately, RFID technology (particularly older versions) is vulnerable. According to several articles, it is actually pretty easy to spoof an RFID card using off-the-shelf technology. Using an Arduino, a toilet paper roll, and a handful of simple components, it's possible to create a transmitter that spoofs an existing card.
This in itself would not be too scary, since in order to spoof a card it is generally considered prohibitively difficult to get close enough to skim the ID code. However, it is not difficult to imagine an RFID skimmer planted behind a legitimate receiver that could not only spoof the ID cards of every resident of a building, but also track their movements over the course of days or weeks. Even without skimming card numbers, it would even be possible to brute-force many older RFID systems, given an attacker knew some basic information about the system in question.
Most modern RFID access control systems utilize more robust protocols to guard against these kinds of vulnerabilities. For example, there might be two-way communication between card and receiver used to authenticate the user. Or the card could use a one-time-pad system to encrypt data. Nevertheless, given the ubiquity of RFID systems, not all of them state-of-the-art, the vulnerabilities of the technology cannot not be ignored.
UPDATE: I realize that this post doesn't cover a current vulnerability in an OS, however this issue is something that affects systems that I use on a daily basis.

No comments:
Post a Comment