{"id":18355,"date":"2018-06-12T08:00:42","date_gmt":"2018-06-12T12:00:42","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18355"},"modified":"2022-04-27T15:06:48","modified_gmt":"2022-04-27T19:06:48","slug":"hackers-can-now-break-into-your-hotel-room","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/hackers-can-now-break-into-your-hotel-room\/","title":{"rendered":"Hackers Can Now Break Into Your Hotel Room"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There\u2019s a new scary threat that hackers have developed which allows them to can break into your hotel room. <\/span><a href=\"https:\/\/thenextweb.com\/security\/2018\/04\/25\/hackers-find-devious-way-break-hotel-rooms\/\"><span style=\"font-weight: 400;\">Cybercriminals engineered a \u2018Master Key\u2019<\/span><\/a><span style=\"font-weight: 400;\"> that exploits a vulnerability in hotel keys with an RFID or magstripe. The vulnerability can gather the digital information of a key and this discovery has hotel chains understandably worried.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/get-to-know-these-cybercrime-trends\/\"><b>Get to Know These Cybercrime Trends<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">There are only a few reports of hotels receiving complaints about a <\/span><a href=\"https:\/\/www.zdnet.com\/article\/millions-of-hotel-door-locks-bypass-with-master-key\/\"><span style=\"font-weight: 400;\">small subset of criminals entering rooms<\/span><\/a><span style=\"font-weight: 400;\"> and taking personal items through this technology, but the vulnerabilities in keycard technology suggest it\u2019s only a matter of time before these crimes go mainstream.<\/span><\/p>\n<p><b>How the Master Key Works and is Built<br \/>\n<\/b><span style=\"font-weight: 400;\">To get a master key to access a room, hackers book a hotel room and copy the data on an electronic keycard, which then gives them access to any room. In some cases, they don\u2019t even need a keycard because the process can be done remotely by standing close to a hotel guest or a hotel employee. The \u2018Master Key\u2019 can be unlocked through a design flaw that\u2019s common in most electronic lock systems. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers then buy a portable programmer for a few hundred dollars to overwrite the key and create a master key within minutes. Once this is accomplished, the cybercriminals generally target travelers who store their laptops, passports, and cash in hotel rooms.<\/span><\/p>\n<p><b>How the Key Opens Doors<br \/>\n<\/b><span style=\"font-weight: 400;\">This device, which is an RFID reader and writer, is simply held close to a door lock. The Master Key will run different key combinations within a hotel\u2019s electronic database in less than a minute, cracking the master key combination to a particular room and unlocking the door. This can be done with a custom-tailored device or by writing the master key back to a hacker\u2019s keycard.<\/span><\/p>\n<p><b>A Temporary Fix<br \/>\n<\/b><span style=\"font-weight: 400;\">Being alerted to this flaw, Assa Abloy, the company who manufactures the portable programmer issued a software fix to keep hotel guests and their personal items safe. The company recommends that hotels worldwide update their keycard software to ensure these cyber attacks don\u2019t occur in their facilities since new vulnerabilities can show up over time.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just when you thought hacking couldn\u2019t go that far, a new scheme hits a fun pastime &#8211; traveling.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[259,218,358,545,249],"class_list":["post-18355","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-privacy","tag-protection","tag-safety","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18355"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18355\/revisions"}],"predecessor-version":[{"id":18798,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18355\/revisions\/18798"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}