RFID Credit Cards Are Easy Prey for Hackers, Demo Shows

With a simple hack and minimal equipment, a security researcher demonstrates how easily thieves can make your data their own.

It's been known for some time that there are security issues associated with the increasing use of RFID tags in credit cards, but this past weekend afforded a fresh demonstration of just how easy it is for hackers to take advantage of them.

Onstage at the Shmoocon hacker conference in Washington, D.C., Recursion Ventures security researcher Kristin Paget used about $350 in equipment to wirelessly read a volunteer’s RFID-enabled credit card and then encode its key data onto a blank card, as described Monday by Forbes.

Next, she used the fraudulent card and a Square Card Reader to make a payment to herself.

'Embarrassingly Simple'

Elaborate trick? Far from it: “This is an embarrassingly simple hack, but it works,” Paget told Forbes.

Essentially, it's possible because much the way the store's point-of-sale device reads the data on a contactless card wirelessly, so, too, can pretty much any RFID reader--through standard wallets and clothing, and regardless of the encryption or security measures that are in place, Paget said.

Today's contactless cards don't make the user’s name, PIN, or permanent three-digit CVV code wirelessly available, the report notes; they also use a one-time CVV code with each scan so as to prevent repeated fraudulent use. In six years of use, there reportedly haven't been any documented cases of this kind of fraud, either.

Still, Paget's demonstration shows how easy it would be for one or more hackers to scan numerous victims' cards, even just to use each of them once.

Three Seconds on 'High'

So what can you do to protect yourself and your business?

First, determine if any of your cards are RFID-enabled. PayPass and payWave, for example, are two of the leading names under which this technology is offered in the United States.

Assuming you do have one, there are a few steps you can take to protect it. Among the more drastic options, certainly, is toasting your RFID chip in the microwave--three seconds will kill it, Paget reportedly told Forbes. Of course, then you can kiss your contactless payment capabilities goodbye as well.

Duct Tape and Aluminum Foil

Recursion Ventures, meanwhile, is reportedly working on a high-powered protection device for RFID-enabled credit cards, but it's still in the prototype stages.

In the meantime, you could try one of today's RFID-blocking shields or wallets, which generally use aluminum or steel to keep out prying eyes. There are even instructions on the Web for how to give your existing wallet RFID-inhibiting protection using just duct tape and aluminum foil.

Though by no means invincible, steps like these may be your best bet for now, short of locking your card up in a safe place.

Join the CSO newsletter!

Error: Please check your email address.

More about NFCRecursion

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Katherine Noyes

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts