Oyster cards at risk from cloning

Researchers in Holland reveal that London’s contactless transport payment cards can be copied, allowing user to travel for free.

Oyster Card

A group of Dutch scientists at Radbound University in Nijmegen, Holland have discovered that the technology used in Mifare cards can be cloned by anyone with a standard laptop.

The contactless smartcards are commonly used to manage access to secure government buildings, hospitals, and schools in Britain, and the same technology is used in over 17 million Oyster cards, used to pay for transport in London.

The scientists successfully cloned a security card for a Dutch public building, and later proceeded to ride for free on the London underground by cloning an Oyster card.

In order to copy an Oyster card, a card reading unit is used to gather the cryptographic key data stored on the card.

This data can then be uploaded to a PC or laptop. Using this equipment, all the cloner needs to do is to brush past someone carrying a working card, or obtain the card itself, and wirelessly read the card's details. The details can then be written to infinite numbers of blank cards, and used for free travel.

Transport for London said it is cracking down on the use of cloned cards.

"Security is the key aspect of the Oyster system and Londoners can have confidence in the security of their Oyster card and personal data," a TfL spokesman said. "We run daily tests for cloned or fraudulent cards and any found would be stopped within 24 hours of being discovered. Therefore the most anyone could gain from a rogue card is one day's travel. Using a fraudulent card for free travel is subject to prosecution."

Security consultants are calling for the cards used in more sensitive locations, such as government buildings and hospitals, to be replaced.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020