Oyster cards at risk from cloning

Researchers in Holland reveal that London’s contactless transport payment cards can be copied, allowing user to travel for free.

Oyster Card

A group of Dutch scientists at Radbound University in Nijmegen, Holland have discovered that the technology used in Mifare cards can be cloned by anyone with a standard laptop.

The contactless smartcards are commonly used to manage access to secure government buildings, hospitals, and schools in Britain, and the same technology is used in over 17 million Oyster cards, used to pay for transport in London.

The scientists successfully cloned a security card for a Dutch public building, and later proceeded to ride for free on the London underground by cloning an Oyster card.

In order to copy an Oyster card, a card reading unit is used to gather the cryptographic key data stored on the card.

This data can then be uploaded to a PC or laptop. Using this equipment, all the cloner needs to do is to brush past someone carrying a working card, or obtain the card itself, and wirelessly read the card's details. The details can then be written to infinite numbers of blank cards, and used for free travel.

Transport for London said it is cracking down on the use of cloned cards.

"Security is the key aspect of the Oyster system and Londoners can have confidence in the security of their Oyster card and personal data," a TfL spokesman said. "We run daily tests for cloned or fraudulent cards and any found would be stopped within 24 hours of being discovered. Therefore the most anyone could gain from a rogue card is one day's travel. Using a fraudulent card for free travel is subject to prosecution."

Security consultants are calling for the cards used in more sensitive locations, such as government buildings and hospitals, to be replaced.

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

NSA releases guidance on voice and video communications security
Voice over Internet Protocol (VoIP)

NSA releases guidance on voice and video communications security

18 Jun 2021
Ransomware criminals look to other hackers to provide them with network access
ransomware

Ransomware criminals look to other hackers to provide them with network access

17 Jun 2021
CVS Health data breach leaves a billion records exposed
data protection

CVS Health data breach leaves a billion records exposed

16 Jun 2021
Four in five ransomware victims suffer repeat attacks
ransomware

Four in five ransomware victims suffer repeat attacks

16 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
Q&A: Enabling transformation
Sponsored

Q&A: Enabling transformation

10 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021