42 votes

Hackers found a way to open any of three million hotel keycard locks in seconds

7 comments

  1. Fal
    Link

    When thousands of security researchers descend on Las Vegas every August for what's come to be known as “hacker summer camp,” the back-to-back Black Hat and Defcon hacker conferences, it's a given that some of them will experiment with hacking the infrastructure of Vegas itself, the city's elaborate array of casino and hospitality technology. But at one private event in 2022, a select group of researchers were actually invited to hack a Vegas hotel room, competing in a suite crowded with their laptops and cans of Red Bull to find digital vulnerabilities in every one of the room's gadgets, from its TV to its bedside VoIP phone.

    One team of hackers spent those days focused on the lock on the room's door, perhaps its most sensitive piece of technology of all. Now, more than a year and a half later, they're finally bringing to light the results of that work: a technique they discovered that would allow an intruder to open any of millions of hotel rooms worldwide in seconds, with just two taps.

    Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. The Saflok systems are installed on 3 million doors worldwide, inside 13,000 properties in 131 countries.

    By exploiting weaknesses in both Dormakaba's encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock. Their technique starts with obtaining any keycard from a target hotel—say, by booking a room there or grabbing a keycard out of a box of used ones—then reading a certain code from that card with a $300 RFID read-write device, and finally writing two keycards of their own. When they merely tap those two cards on a lock, the first rewrites a certain piece of the lock's data, and the second opens it.

    “Two quick taps and we open the door,” says Wouters, a researcher in the Computer Security and Industrial Cryptography group at the KU Leuven University in Belgium. “And that works on every door in the hotel.”

    34 votes
  2. [3]
    jwhardcastle
    Link
    Kudos to the researchers for working with the manufacturer to ensure a fix could be developed and deployed to many locations before publishing.

    Kudos to the researchers for working with the manufacturer to ensure a fix could be developed and deployed to many locations before publishing.

    33 votes
    1. [2]
      Eji1700
      Link Parent
      This is generally expected in the industry, especially if you’re the kind of person going to black hat. The goal is to find vulnerabilities so they can be fixed, not cause mass chaos. If the maker...

      This is generally expected in the industry, especially if you’re the kind of person going to black hat. The goal is to find vulnerabilities so they can be fixed, not cause mass chaos.

      If the maker of the device refuses to respond you still go public in stages. Basically “hey we have this compromise and they don’t care. We will be releasing it in one year so you have time to fix this. “ sort of thing.

      6 votes
      1. jwhardcastle
        Link Parent
        I understand, I was in software development for 15 years. I'm sure the disclosure timelines were agreed upon before they were invited to hack on the gear. My original point stands, however; kudos...

        I understand, I was in software development for 15 years. I'm sure the disclosure timelines were agreed upon before they were invited to hack on the gear. My original point stands, however; kudos for going white hat versus doing this the less-than-legal way.

        4 votes
  3. [2]
    bl4kers
    Link

    “We think the vulnerability has been there for a long time,” says Wouters. “It's unlikely that we are the first to find this.”

    8 votes
    1. tanglisha
      Link Parent
      At the 2019 Defcon, I heard so many people who were saying at Linq complaining that their rooms had been broken into. I think this got lost in the shuffle because of the room searches Caesar's had...

      At the 2019 Defcon, I heard so many people who were saying at Linq complaining that their rooms had been broken into. I think this got lost in the shuffle because of the room searches Caesar's had been been doing.

      4 votes