Oyster hackers roam London for free
By Matthew Sparkes
Posted on 23 Jun 2008 at 11:05
Researchers have hacked an Oyster card to get a day's free travel on the London Underground.
The Dutch researchers from Radboud University used a laptop and RFID reader to crack the algorithm used by the cards, enabling them to place credit back on it to get free access to the London Underground.
Speaking to PC Pro this morning a Transport for London spokesperson claimed that the vulnerability would not work for long because the credit balance is stored both on the Oyster card and on a central database.
"Security is the key aspect of the Oyster system and Londoners can have confidence in the security of their Oyster card and personal data," claims a Transport for London spokesperson. We run daily tests for clones of fraudulent cards and any found would be stopped within 24 hours of being discovered. Therefore the most anyone could gain from a rogue card is one days travel."
However, the information held on the cards is only periodically synchronised to a central database, allowing the researchers a 24-hour period to use their card for free travel around the capital.
The software used by the group to achieve this will not be released, but details will be covered by a paper later this year.
The vulnerability could also theoretically affect much more than travel cards. The Oyster card system uses MIFARE chips from NXP Semiconductors, which are also used in keyless entry systems around the world. Half a billion of the RFID chips have been sold so far, along with five million readers.
"We are aware that the Dutch researchers have reverse engineered the algorithm and we are taking this issue very seriously," said a spokesperson from the company, speaking to the Times. "We've informed all of our system integrators and advised them to closely assess their systems. We're talking to the guys at Radboud University and have identified various counter measures."
Is your business a social business? For helpful info and tips visit our hub.
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book
- 1.6TB SSD: why would you need one?