Saturday, April 5, 2025
HomeBackdoorBackdoor MIFARE Smart Cards Exposes User-Defined Keys On Cards

Backdoor MIFARE Smart Cards Exposes User-Defined Keys On Cards

Published on

SIEM as a Service

Follow Us on Google News

Researchers analyze the security of MIFARE Classic cards, focusing exclusively on card-only attacks. They uncover multiple new attack vectors by examining the CRYPTO-1 algorithm, existing vulnerabilities, and a novel countermeasure. 

Through a combination of reverse engineering, cryptanalysis, and experimental analysis, they demonstrate the ability to extract card data and keys, clone cards, and ultimately compromise the security of both current and older MIFARE Classic card generations. 

The research culminates in the development of optimized attack tools and a deep understanding of the underlying vulnerabilities, emphasizing the critical need for replacing MIFARE Classic in modern applications.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

It investigates the vulnerabilities of MIFARE Classic memory cards using the CRYPTO-1 protocol by analyzing existing card-only attacks that exploit weaknesses in the protocol’s implementation, such as predictable nonce generation and parity bit leaks. 

Initial Observed across 500 authentication attempts with a FM11RF08S

Then, introduce the FM11RF08S card, which implements countermeasures against these attacks and uses a static encrypted nonce for nested authentication and a repeatable initial nonce generated by a Linear Feedback Shift Register (LFSR). 

Researchers discovered and exploited a backdoor in FM11RF08S RFID tags. By analyzing the tag’s response to unexpected commands, they uncovered a hidden authentication method that bypasses standard security measures. 

This backdoor grants full read access to all tag data, including previously inaccessible blocks, while the team developed a technique to recover the main encryption key, rendering the tag’s security mechanisms ineffective. 

It undermines the security of numerous RFID systems employing this tag model, emphasizing the critical need for robust security measures in embedded systems. 

FM11RF08S block 0 example

They discovered and exploited a backdoor in FM11RF08 and FM11RF08S MIFARE Classic clones, drastically accelerating key recovery attacks.

By targeting both keyA and keyB simultaneously and optimizing the key search process, they reduced attack time by a factor of six. 

Additionally, they identified a universal backdoor key applicable to older FM11RF08 models and even FM1208-10 devices, which enables rapid key extraction without prior knowledge, posing significant security risks for supply chain actors and end-users alike. 

Extensive testing of backdoor authentication commands on various card models revealed that certain non-Fudan cards unexpectedly accept these commands using a specific backdoor key, identical to that employed by Fudan FM11RF08 cards. 

 newer FM11RF08S block 128 access rights = 00F0FF

A separate group of cards, including NXP MF1ICS5005, MF1ICS5006, and MF1ICS5007, respond to backdoor commands using standard keyA/keyB authentication, while USCUID/GDM magic cards also fall into this category. 

The darknested attack is particularly effective against SLE66R35, MF1ICS5003, and MF1ICS5004 due to the slower key recovery process compared to the darkside attack. 

Researchers have discovered a critical hardware backdoor in the widely used FM11RF08S MIFARE Classic chip, enabling previously impossible attacks on card data, including cloning. 

The backdoor, present in all FM11RF08 chips since 2007, undermines the chip’s touted security and compromises systems worldwide, while the same backdoor key has been found on older NXP and Infineon cards, raising serious security concerns. 

MIFARE Classic’s inherent vulnerabilities remain, and this discovery highlights the urgent need for infrastructure audits and migration to more secure alternatives.

Tools and attack methods have been integrated into the Proxmark3 platform for public analysis and defense.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Exploit Ivanti VPN Vulnerability to Deliver Malware Payloads

Ivanti disclosed a critical security vulnerability, CVE-2025-22457, affecting its Connect Secure (ICS) VPN appliances,...

Vite Development Server Flaw Allows Attackers Bypass Path Restrictions

A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server.Due to improper...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...