RFID Hacking and How to Prevent It (2024)

RFID stands for Radio Frequency Identification, and it is a form of short-range communication between RFID-enabled data chips (like the ones in employee badges or credit cards) and RFID-enabled readers (like electronic access control for doors or credit card readers).

This technology has been around in a rudimentary form since 1945, when a Soviet scientist invented what was essentially the first covert listening device in order to spy on the US during the burgeoning Cold War.

In 1996, RFID was patented in its modern form of a batteryless data tag that can receive radio signals.

And since then, this versatile and cost-effective technology has come to be used in a number of ways including:

  • tracking inventory
  • contactless credit cards
  • toll collection
  • security applications
  • access control
  • employee identification

But as with any technology, with greater usage comes greater opportunity to exploit its weaknesses, and RFID is no exception.

RFID Hacking and How to Prevent It (1)

How Does RFID Get Hacked?

Data chips with RFID can be scanned from a distance. This is what makes them so useful, and also vulnerable to hackers.

Long Distance Information Capture

RFID scanners that capture and record ID information are certainly not legal, but for those with the proper skills, they’re easy to build.

Hackers use a long-range reader to silently steal this ID info from any RFID cards that happen to walk by.

For example, a hacker can simply have this device in a messenger bag on a busy morning bus, or sitting outside a targeted workplace, and the reader will harvest information as employees walk past with their badges.

This all happens without leaving any digital trace.

Making a Copy

Once the information has been captured by the hacker, the next step is to make a copy of that card or cards. This is known as “cloning” or “spoofing.”

The cloned card will give the hacker the same digital ID profile as the original, meaning that the hacker then has the same authorization and level of access.

You can see how this could escalate quickly from a hacker simply making it in the front door of the building, to unlocking an access-controlled computer or server room and commencing to do whatever damage they please.

Active Jamming

Hackers can and have jammed RFID cards and tags from working simply by being nearby and generating a signal that is stronger than the one being put out by the RFID reader.

This can make it impossible to track inventory using RFID, while also creating general havoc by preventing access using ID cards.

Eavesdropping

Hackers can also use an antenna to record the communications between real RFID tags and RFID readers. This “eavesdropping” gathers data on how and where RFID tags are used, which the hacker can use to plan and launch bigger attacks later on.

RFID Hacking and How to Prevent It (2)

How To Prevent RFID Hacking

There is no single silver bullet to prevent RFID hacking. But there are a matrix of solutions that can be combined for greater security and data protection to protect against RFID hacking.

Use Passive RFID

RFID tags that are classified as “passive” have a much weaker signal than one that is “active.”

While this means that the tag needs to be much closer to a reader in order to work, it also means that long-range hacker scanners are too far away to collect information from a passive RFID tag.

Use RFID Protection Outside the Building

One low-cost, low-tech way to lessen card cloning is by keeping RFID cards and RFID-enabled devices in special pouches or bags that block RFID signals. These prevent the cards from being scanned by a hacker, but they also keep the card from being scanned by legitimate readers, so this solution is best when the card is outside the building and not in frequent use.

Use The Most Secure Cards On The Market

Choose proximity cards that have extra security features that resist hacking and tampering, like the HID Seos product line. (We’ve also talked more about the different cards from the HID brand here.) These cards and their readers have cryptographic algorithms that wrap another layer of protection around the data they contain, essentially equipping them with two-factor identification that makes them much more difficult to hack with a long-range scanner.

Data Correlation to Prevent Card Doubles

To prevent cloned cards from getting in the door, leverage access control technology to your advantage by setting protocols in your access control that disallows duplicates. An RFID card that is already “checked in” and present in the database cannot be checked in again without being checked out first.

Penetration Testing

This is the term for a security exercise where a skilled “white hat” or good-guy hacker deliberately tests your system to see where it has weaknesses and how it could be exploited.

Pen testing is extremely useful because it tests and measures the existent security using the same tactics that a “black hat” or bad-guy hacker would use in a way that is specific to your systems’ layout, access points, and technology. Your security team can then take that feedback and create solutions and protocols to deal with any identified vulnerabilities.

Use Wired Network and Authorizations for Sensitive Information and Equipment

Wireless devices that use RFID access control are convenient, but they are by nature less secure than wired connections, which are far more difficult for hackers to gain access to and infiltrate. So make wired connectivity a must for the most sensitive parts of your network: things like server rooms that store customer info, proprietary information, or operational consoles for important equipment.

Robust Physical Security

Don’t rely on RFID cards to protect your employees, assets, or equipment. A strong physical security system in addition to prox cards and RFID tags is a must for true security in a commercial setting. Access control using prox cards can be reinforced with video surveillance, biometric readers, PIN pads, and other obstacles. All together, these security measures turn your business from a soft target, with multiple weaknesses that can be easily exploited, to a hard target, with a few weak points that are well shored up with secondary safety measures.

RFID Hacking and How to Prevent It (3)
RFID Hacking and How to Prevent It (2024)

FAQs

RFID Hacking and How to Prevent It? ›

Use Passive RFID

How can we prevent RFID scanning? ›

Any material that can interfere with electromagnetic fields is able to block RFID. The most common materials used in the manufacture of RFID blocking wallets and bags are carbon fiber, aluminum, and leather. In a pinch, you can just wrap your credit card in tinfoil to protect against skimming attacks.

What is RFID Reading answers? ›

What is RFID? Radio Frequency Identification (RFID) is a set of technologies that enables tracking and monitoring activities to be carried out using RFID transponders (often called tags) and invisible radio waves without a line of sight.

How can I improve my RFID security? ›

Create A Password For Each Data Transmission

You should also consider locking each tag with a password so that whenever you want to transmit data from or to a particular tag, you must first enter a code known only to you or people you trust.

How do I secure my RFID reader? ›

A Faraday cage is a conductive enclosure that can block electromagnetic signals and can be used to protect sensitive RFID systems from eavesdropping and other types of attacks. Physical security: Implementing physical security measures, such as locks or alarms, can prevent unauthorized access to the tags and readers.

Can aluminum foil protect credit cards? ›

“While wrapping one's wallet in tin foil might offer protection, this would be true only if one has credit cards that are vulnerable to scanning,” Shenoy wrote in an email. Normal credit cards have a magnetic swipe feature – those cards can not be scanned in this way.

Do credit cards use RFID or NFC? ›

That's because contactless credit card payments are enabled by a type of RFID technology called near-field communication, or NFC. When you wave your credit card or phone's digital wallet in front of a contactless reader for a few seconds, the NFC technology is activated, allowing the payment to be processed.

How do you detect an RFID reader? ›

You can detect the presence of radio waves using a high-performance digital oscilloscope, such as the R&S RTO Oscilloscope from, Rohde & Schwarz, or a spectrum analyzer, such as the ESA-E Series Economy Spectrum Analyzer, from Agilent.

What does an RFID scanner read? ›

Like barcode technology, RFID Scanner recognizes locations and identification of tagged items — but instead of reading laser light reflections from printed barcode labels, it leverages low-power radio frequencies to collect and store data.

What can you use to block RFID? ›

Some of the most common materials used to block RFID signals include:
  • Metal: Metal is a highly effective RFID signal blocker, as it reflects radio waves and prevents them from penetrating the material. ...
  • Water: ...
  • Concrete: ...
  • Leather: ...
  • Faraday cages: ...
  • RFID-blocking materials:
Aug 6, 2023

Can RFID be manipulated? ›

Detecting RFID Counterfeiting

These tags lack encryption, rendering them vulnerable to manipulation by malicious actors. Attackers can modify tag data, transforming invalid tags into valid ones and vice versa, potentially compromising the authenticity of products.

What destroys RFID chip? ›

To kill a tag, you need to overload it with energy and blow its circuits. These circuits are tiny, so even static electricity from your finger can blow them, as long as you are able to touch the chip directly.

What blocks RFID scanning? ›

RFID-blocking purses and wallets are lined with special materials that create a protective barrier against RFID signals. These materials, such as metal-infused fabrics or layers of conductive materials, block or scramble the radio waves, preventing RFID readers from accessing the information stored in your cards.

How do I stop RFID skimming? ›

To protect yourself against RFID skimming, you can line your RFID devices with foil or invest in an RFID-blocking jacket or wallet. If you're interested in providing your residents with an alternative to RFID credentials, you can invest in other methods of access control, like smartphone-based access.

Can I use my phone as a RFID reader? ›

Read/Write Capability: Not all mobile phones can read and write RFID cards. Phones with NFC (Near Field Communication) functionality are more likely to support RFID card interaction.

How do I block an RFID signal? ›

The simplest form of RFID blocking for consumers is to make a wallet, purse, or bag out of aluminum foil and tape to hold it together. This blocks the radio signals between any cards or identifying documents you are carrying and potential hackers who might walk by, attempting to scrape this information from you.

How to make RFID protection? ›

Make a foil shield.

This is the “low-tech” way to go, but it's cheap and easy. Cut two pieces of paper or cardboard into the size of a credit card, wrap each piece with aluminum foil, and carry them in your wallet around your credit cards. The aluminum will disrupt most electronic signals.

How do you stop RFID interference? ›

Separate Your NFC/RFID Cards

You could accomplish this by having one card in your wallet, and another in a badge holder, and keeping them separated by around 2-3 inches when tapping one to a reader. Even closer than 10cm would be fine, though.

How to disable RFID? ›

If you know the security code that you need to transmit to the tag, you can send that code and deactivate it. If you don't have the code—or if it is a passive high-frequency (HF) or low-frequency (LF) tag—then the best way to deactivate it is to zap it with electricity.

Top Articles
Emerging markets outlook - Summer 2024
C'est quoi la fonction des animaux
Debunking Black Cat Superstitions
Amwednesday Vimeo
Busted Newspaper Mcpherson Kansas
Little League Coach Daily Themed Crossword
7025825949
Google Doodle Baseball Classroom
Www.adultswim.com Activate
Ultima Online Outlands Map
When His Eyes Opened Chapter 191
Dr Manish Patel Mooresville Nc
Victoria Tortilla & Tamales Factory Menu
Bone Of The Ancients
Christmas concerts, comedy and more: The top 10 things to do in Bay County next week
Madlyn Cline Ass
Play Billiards Near Me
What Are Lash Extensions and How Are They Applied?
Dial Murray Obituaries Moncks Corner Sc
Noaa Rochester Mn
7 Movierulz
Sam's Club Gas Price Annapolis
How to Find the Subdomains of a Domain | Geekflare
Acts 16 Nkjv
Northeast Ob Gyn Associates Quarry
Www Cortrustbankcc.com
Joy Ride 2023 Showtimes Near Amc Ward Parkway
Roblox Mathsspot Now.gg
Evo Unblocked
How to Use a Self-Service Car Wash | YourMechanic Advice
Madewell Valley Fair
Statement from Secretary of Education on National Center for Education Statistics' Data Showing Student Recovery Throughout the 2021-2022 School Year
27L1576
Couponsky Net
Manage limits.conf configurations in Splunk Cloud Platform
100 Million NGN to USD
104 Whiley Road Lancaster Ohio
Dollar General Warehouse Pay Rate
George The Animal Steele Gif
Copper Grooming Report
Magicseaweed Bob Hall
Texas Motors Specialty Photos
Dirtyone 2006
Lubbock Avalanche Journal Newspaper Obituaries
What Happened To Ed Hanna Wfmz
Warfare Personified Crossword Clue
The Nun 2: release date, plot, cast, trailer and everything we know
24 Hours Body Massage Near Me
Mytp Saba Cloud
Best New England Boarding Schools
Lauren Mayberry of CHVRCHES has a brand new solo career — and a sound all her own
Find The Markers Microwave Code
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6343

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.