Section 4.35 Access Badge cloning Flashcards
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
Access Badge Cloning
Radio Frequency Identification (RFID) and Near Field Communication (NFC) are popular technologies used for contactless authentication in various applications
Copying the data from an RFID or NFC card or badge onto another card or device
4 steps
How does an attacker clone an access badge?
Step 1: Scanning - Scanning or reading the targeted individual’s access badge
Step 2: Data Extraction - Attackers extract the relevant authentication credentials from the card, such as a unique identifier or a set of encrypted data
Step 3: Writing to a new card or device - Attacker will then transfers the extracted data onto a blank RFID or NFC card or another compatible device (Flippper Zero device)
Step 4: Using the cloned access badge - Attackers gain unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card
Access badge cloning is common because of its Ease of execution, Ability to be stealthy when conducting the attack and Potentially widespread use in compromising physical security.
6 examples
How can you stop access badge cloning?
A.M.U.E.S.A
- Advanced encryption in your card-based authentication systems
- Multi-Factor Authentication (MFA)
- Update your security protocols regulalry
- Educate your users
- Shielded wallets / sleeves with your RFID access badges
- Audit access logs