Saturday, March 2, 2024

Hotel Electronic Locks Vulnerability Left Millions of Hotel Rooms World Wide Vulnerable to Hack

A critical flaw discovered with electronic lock system’s software left millions of hotel rooms vulnerable to hackers around the world.

The electronic lock system could be exploited by hackers to gain access to any room facility, the lock software known as Vision by VingCard manufactured by Swedish company Assa Abloy.

F-Secure’s Tomi Tuominen and Timo Hirvonen carried out the research, they found that the Vision software could be exploited by the hackers within the same network and they gain access to the sensitive data.

How an Attacker Might get Access

Attackers need to get access to any ordinary electric key of the target hotel it can be any key a room key or a key to a storage closet or garage or even the key that expired five years before will work.

Then the keycard data is scanned by using a small hardware device and the device derives many keys to test against the target and within minutes it derives the master key to the facility.

Also Read PoS Malware Ultimately Designed to Steal Credit Card Details Through DNS Requests

The master with the escalated privileges gives unrestricted access to the facility. The attack can be performed without being noticed.

“You can imagine what a malicious person could do with the power to enter any hotel room, with a master key created basically out of thin air,” said Tomi Tuominen, Practice Leader at F-Secure Cyber Security Services. “We don’t know of anyone else performing this particular attack in the wild right now.

The research wasn’t an immediate effort, it takes a decade. It was started in 2003 when a colleague’s laptop has been stolen from the locked hotel room without any hint of unauthorized entry physically in the hotel room or digitally in the software logs.

So the hotel staff dismissed the complaint and the researchers decided to investigate further by choosing a lock brand known for quality and security.

“We wanted to find out if it’s possible to bypass the electronic lock without leaving a trace,” said Timo Hirvonen, Senior Security Consultant at F-Secure.

F-secure reported the vulnerability to Assa Abloy and has collaborated with them to implement the security fixes and the update has been provided for all the affected products.

Researchers said we should never assume that no one else has made the same discovery we have, so applying the software update is highly recommended.


Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles