Section 4.35 Access Badge cloning Flashcards

Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity

1
Q

Access Badge Cloning

A

Radio Frequency Identification (RFID) and Near Field Communication (NFC) are popular technologies used for contactless authentication in various applications

Copying the data from an RFID or NFC card or badge onto another card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 steps

How does an attacker clone an access badge?

A

Step 1: Scanning - Scanning or reading the targeted individual’s access badge

Step 2: Data Extraction - Attackers extract the relevant authentication credentials from the card, such as a unique identifier or a set of encrypted data

Step 3: Writing to a new card or device - Attacker will then transfers the extracted data onto a blank RFID or NFC card or another compatible device (Flippper Zero device)

Step 4: Using the cloned access badge - Attackers gain unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card

Access badge cloning is common because of its Ease of execution, Ability to be stealthy when conducting the attack and Potentially widespread use in compromising physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

6 examples

How can you stop access badge cloning?

A.M.U.E.S.A

A
  1. Advanced encryption in your card-based authentication systems
  2. Multi-Factor Authentication (MFA)
  3. Update your security protocols regulalry
  4. Educate your users
  5. Shielded wallets / sleeves with your RFID access badges
  6. Audit access logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly