Access Badge Cloning Flashcards
(7 cards)
What is Access Badge Cloning?
Copying the data from an RFID or NFC card or badge onto another card or device
What is Step 1 of cloning an access badge?
Scanning: Scanning or reading the targeted individual’s access badge
What is Step 2 of cloning an access badge?
Data Extraction: Attackers extract the relevant authentication credentials from the card, such as a unique identifier or a set of encrypted data
What is Step 3 of cloning an access badge?
Wrting a new card or device: Attacker will then transfers the extracted data onto a blank RFID or NFC card or another compatible device
What is Step 4 of cloning an access badge?
Using the cloned access badge: Attackers gain unauthorized access to buildings, computer systems, or even make payments using a cloned NFC-enabled credit card
Why is Access Badge Cloning common?
■ Easeofexecution
■ Ability to be stealthy when conducting the attack
■ Potentially widespread use in compromising physical security
How can you stop Access Badge Cloning?
■ Implement advanced encryption in your card-based authentication systems
■ Implement Multi-Factor Authentication (MFA)
■ Regularly update your security protocols
■ Educateyour users
■ Implement the use of shielded wallets or sleeves with your RFID access badges
■ Monitor and audit your access logs