Thursday, April 24, 2025
HomeBackdoorBackdoor MIFARE Smart Cards Exposes User-Defined Keys On Cards

Backdoor MIFARE Smart Cards Exposes User-Defined Keys On Cards

Published on

SIEM as a Service

Follow Us on Google News

Researchers analyze the security of MIFARE Classic cards, focusing exclusively on card-only attacks. They uncover multiple new attack vectors by examining the CRYPTO-1 algorithm, existing vulnerabilities, and a novel countermeasure. 

Through a combination of reverse engineering, cryptanalysis, and experimental analysis, they demonstrate the ability to extract card data and keys, clone cards, and ultimately compromise the security of both current and older MIFARE Classic card generations. 

The research culminates in the development of optimized attack tools and a deep understanding of the underlying vulnerabilities, emphasizing the critical need for replacing MIFARE Classic in modern applications.

- Advertisement - Google News

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

It investigates the vulnerabilities of MIFARE Classic memory cards using the CRYPTO-1 protocol by analyzing existing card-only attacks that exploit weaknesses in the protocol’s implementation, such as predictable nonce generation and parity bit leaks. 

Initial Observed across 500 authentication attempts with a FM11RF08S

Then, introduce the FM11RF08S card, which implements countermeasures against these attacks and uses a static encrypted nonce for nested authentication and a repeatable initial nonce generated by a Linear Feedback Shift Register (LFSR). 

Researchers discovered and exploited a backdoor in FM11RF08S RFID tags. By analyzing the tag’s response to unexpected commands, they uncovered a hidden authentication method that bypasses standard security measures. 

This backdoor grants full read access to all tag data, including previously inaccessible blocks, while the team developed a technique to recover the main encryption key, rendering the tag’s security mechanisms ineffective. 

It undermines the security of numerous RFID systems employing this tag model, emphasizing the critical need for robust security measures in embedded systems. 

FM11RF08S block 0 example

They discovered and exploited a backdoor in FM11RF08 and FM11RF08S MIFARE Classic clones, drastically accelerating key recovery attacks.

By targeting both keyA and keyB simultaneously and optimizing the key search process, they reduced attack time by a factor of six. 

Additionally, they identified a universal backdoor key applicable to older FM11RF08 models and even FM1208-10 devices, which enables rapid key extraction without prior knowledge, posing significant security risks for supply chain actors and end-users alike. 

Extensive testing of backdoor authentication commands on various card models revealed that certain non-Fudan cards unexpectedly accept these commands using a specific backdoor key, identical to that employed by Fudan FM11RF08 cards. 

 newer FM11RF08S block 128 access rights = 00F0FF

A separate group of cards, including NXP MF1ICS5005, MF1ICS5006, and MF1ICS5007, respond to backdoor commands using standard keyA/keyB authentication, while USCUID/GDM magic cards also fall into this category. 

The darknested attack is particularly effective against SLE66R35, MF1ICS5003, and MF1ICS5004 due to the slower key recovery process compared to the darkside attack. 

Researchers have discovered a critical hardware backdoor in the widely used FM11RF08S MIFARE Classic chip, enabling previously impossible attacks on card data, including cloning. 

The backdoor, present in all FM11RF08 chips since 2007, undermines the chip’s touted security and compromises systems worldwide, while the same backdoor key has been found on older NXP and Infineon cards, raising serious security concerns. 

MIFARE Classic’s inherent vulnerabilities remain, and this discovery highlights the urgent need for infrastructure audits and migration to more secure alternatives.

Tools and attack methods have been integrated into the Proxmark3 platform for public analysis and defense.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the...

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to...

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo...