Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy Security

Hackers Found a Way To Open Any of 3 Million Hotel Keycard Locks In Seconds (wired.com) 33

An anonymous reader quotes a report from Wired: When thousands of security researchers descend on Las Vegas every August for what's come to be known as "hacker summer camp," the back-to-back Black Hat and Defcon hacker conferences, it's a given that some of them will experiment with hacking the infrastructure of Vegas itself, the city's elaborate array of casino and hospitality technology. But at one private event in 2022, a select group of researchers were actually invited to hack a Vegas hotel room, competing in a suite crowded with their laptops and cans of Red Bull to find digital vulnerabilities in every one of the room's gadgets, from its TV to its bedside VoIP phone. One team of hackers spent those days focused on the lock on the room's door, perhaps its most sensitive piece of technology of all. Now, more than a year and a half later, they're finally bringing to light the results of that work: a technique they discovered that would allow an intruder to open any of millions of hotel rooms worldwide in seconds, with just two taps.

Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. The Saflok systems are installed on 3 million doors worldwide, inside 13,000 properties in 131 countries. By exploiting weaknesses in both Dormakaba's encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock. Their technique starts with obtaining any keycard from a target hotel -- say, by booking a room there or grabbing a keycard out of a box of used ones -- then reading a certain code from that card with a $300 RFID read-write device, and finally writing two keycards of their own. When they merely tap those two cards on a lock, the first rewrites a certain piece of the lock's data, and the second opens it.

Dormakaba says that it's been working since early last year to make hotels that use Saflok aware of their security flaws and to help them fix or replace the vulnerable locks. For many of the Saflok systems sold in the last eight years, there's no hardware replacement necessary for each individual lock. Instead, hotels will only need to update or replace the front desk management system and have a technician carry out a relatively quick reprogramming of each lock, door by door. Wouters and Carroll say they were nonetheless told by Dormakaba that, as of this month, only 36 percent of installed Safloks have been updated. Given that the locks aren't connected to the internet and some older locks will still need a hardware upgrade, they say the full fix will still likely take months longer to roll out, at the very least. Some older installations may take years.

This discussion has been archived. No new comments can be posted.

Hackers Found a Way To Open Any of 3 Million Hotel Keycard Locks In Seconds

Comments Filter:
  • Granted, if you are not IN your room, yeah I get it. But any time I'm in a hotel room, the deadbolt is flipped and that other swinging thing that took the place of the little chain is flipped as well. Heck, you never know who might try to get into your room.
    • by tlhIngan ( 30335 )

      Granted, if you are not IN your room, yeah I get it. But any time I'm in a hotel room, the deadbolt is flipped and that other swinging thing that took the place of the little chain is flipped as well. Heck, you never know who might try to get into your room.

      Vulnerable to a under door attack - because the deadbolt often unlocks itself if you move the door handle. Thus an attacker with a cheap and easily made tool will slip it between the gap between the floor and bottom of the door, then try to get at the do

    • Re:Lock the door? (Score:4, Interesting)

      by Randseed ( 132501 ) on Thursday March 21, 2024 @08:52PM (#64335135)

      Heck, you never know who might try to get into your room.

      Yeah, like in Vegas during the last few years of DEFCON when some hired toad comes into your room not respecting the "do not disturb" sign. In several cases they were caught screwing around with people's equipment, rifling through suitcases, etc. In my case, I was sitting down in one of the villages when I got a text message that someone was trying to screw with my laptop. By the time I got up there, they were gone, but left the laptop out of standby mode with an invalid password error message still on the screen. At some of those places, I can't even trust that they don't have hidden cameras stuck somewhere to film high profile people having sex or doing drugs or whatever for blackmail purposes.

      • Re:Lock the door? (Score:5, Insightful)

        by thegarbz ( 1787294 ) on Friday March 22, 2024 @06:26AM (#64335665)

        You were at DEFCON. If there's one place you expect someone to do something like that it's DEFCON. It may not be a hired toad, it may have been the guy in the room right next to yours, proving a point for their upcoming presentation.

      • by AmiMoJo ( 196126 )

        Not trying to criticise or anything, but why do people take real devices to DEFCON and similar events?

        I'd be inclined to either bring a diskless system and boot from a flash drive I kept on my person at all times, or no laptop at all. I'd certainly never let it out of my sight.

        Honeypot?

  • by joshuark ( 6549270 ) on Thursday March 21, 2024 @11:52PM (#64335389)

    A friend I called paranoid told me how they block the door, even with a lock and chain on the door, with a chair, or table.

    I called them paranoid then, but now I can see this friend had a point of not trusting the "security" of the door...paranoid but not stupid. Reminds me of the electronics gear in the fat felt marker that could open a certain company's electronic locks used in hotels. Secure seems almost a buzzword in the hospitality industry.

    JoshK.

  • The following spring to mind:

    "Definitively the best and the most practical talk at CHES 2011 was given by David Oswald. The work has been descried in the paper titled "Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World" by David Oswald and Christof Paar both from Ruhr-University Bochum and concerns practical attacks on contactless smardcards."

    "In December 2007, the security of the Mifare Classic 4K card became the subject of
    debate. This was invoked by a presentation given at a

    • And even Mifare did not advertise this system as "high security". The company had more secure systems even back then. But Mifare classic (as it later became known) was chosen by lots of companies around the world as it was just cheaper. I can still hear my old manager say: "I can't sell secure!"
  • The Wired article is behind a paywall.

    Is there another link to this "story"?

Elliptic paraboloids for sale.

Working...