Tiny Hacking Device Lets Anyone Into Your Office

Credit: Dmitry Kalinovsky/Shutterstock

(Image credit: Dmitry Kalinovsky/Shutterstock)

LAS VEGAS — Many office access-card systems can be defeated by a tiny, cheap device that takes about 60 seconds to install, two Canadian researchers demonstrated yesterday (Aug. 6) at the Black Hat security conference here.

Mark Baseggio of security firm Optiv and Eric Evenchick of electric-car startup Faraday Future explained that their battery-powered device, called a BLEKey, intercepts codes transmitted and received by access-card readers made by Texas-based HID Global and used by thousands of companies across North America.

The BLEKey then transmits the code via a Bluetooth Low Energy (BLE) signal to a nearby smartphone, which can replay the code to grant unauthorized persons entry to a secure area, or retain the code to create counterfeit access cards. Baseggio and Evenchick had 250 BLEKeys made in China for about $10 each.

MORE: Best Identity Theft Protection Services

"If it seems that we're picking on HID, that's only because of its marketplace prominence," Evenchick said, adding that other makers of access-card systems were vulnerable as well.

The problem with most access cards and readers, Baseggio and Evenchick explained, is that the systems use a decades-old technology called the Wiegand effect. It's named after the physicist who discovered in the 1970s that with properly designed wires, magnetic induction could be used to transmit data at close proximity, usually less than an inch.

Wiegand "wires" are the basis of most keycard systems in North America, the researchers said, because even newer access-card systems using more secure technologies frequently "downgrade" to Wiegand protocols to ensure backward compatibility.

However, the BLEKey doesn't directly capture the magnetic signals transmitted between the keycard and the reader. Instead, you have open up the card reader and install the BLEKey, which is not much bigger than a quarter. But because the device simply crimps onto three existing wires without breaking them, it can be installed in about a minute, as a video by Baseggio and Evenchick demonstrated.

Once it's in the card reader, the BLEKey reads the electric pulses that travel through the wires whenever an access-card is read and transmits them to a nearby smartphone. The captured data can be used to grant unauthorized access to an office or other facility.

Even card readers that force users to enter a PIN into a keypad to gain entry can be defeated, the researchers said, because the PIN data is transmitted along the same wires that the BLEKey is crimped to.

(Sometimes you don't even have to intercept the codes, Baseggio and Evenchick pointed out; many keycards have the codes printed right on the back, and a photograph will do.)

The researchers demonstrated the BLEKey on a miniature door connected to an HID access-card reader. Evenchick swiped a keycard next to the reader, opening the door while Baseggio captured the code on his smartphone a few feet away. Baseggio then opened the door again from his smartphone.

By transmitting bogus signals, they explained, the BLEKey could also be used to deny authorized users access.

The pair showed off something that didn’t need a BLEKey — an extra-strength commercially available card reader with a range of several inches. They had rigged it up to a battery and placed it in a backpack, and explained that the reader could be used to capture keycodes from people walking in a crowd.

Companies can defeat BLEKeys, the researchers said, by implementing tamper-proof features on keycard readers, logging user entry patterns and using a video-surveillance system to match card entry ID with visual ID.

Evenchick and Baseggio handed out their stock of BLEKeys for free after their presentation, but we just missed out and won't be able to hack into our own office quite yet. The researchers plan to put their diagrams and instructions online so that anyone can replicate their efforts.

Paul Wagenseil is a senior editor at Tom's Guide focused on security and gaming. Follow him at @snd_wagenseilFollow Tom's Guide at @tomsguide, on Facebook and on Google+.

TOPICS
Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
Latest in News
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far
iPhone 17 Pro render
iPhone 17 Pro — 7 biggest rumored upgrades
CAD renderings of the Google Pixel 10 Pro XL
Pixel 10 leak could be good news for all Android phones
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
Lewis Hamilton of Great Britain and Scuderia Ferrari looks on during Sprint Qualifying ahead of the F1 Grand Prix of China at Shanghai International Circuit in Shanghai, China, on March 21, 2025. (Photo by Song Haiyuan/Paddocker/NurPhoto via Getty Images)
How to watch Chinese Grand Prix 2025 online – stream F1 without cable, qualifying highlights