Researchers crack London's Oyster card security

By

Researchers have successfully cracked the security of the Oyster card used for fare payments on buses and tubes in London.


Researchers from Radboud University in the Netherlands have successfully cracked the security of the Oyster card used for fare payments on buses and tubes in London.

The researchers travelled on the tube on a cloned card, reset its credit level from a laptop and caused gates to jam closed.

Transport for London (TfL) said that its Oyster cards are secure, that personal information is kept separate from journey information and that anyone caught using a cloned card would be prosecuted.

The system is checked every 24 hours and the best any Oyster criminal could get is a day's free travel, the company claimed.

Radboud researcher Wouter Teepe presented evidence on the crack to the Dutch parliament, which has already delayed installation of a €1bn automated payment transport system based on the same core technology.

At the heart of an Oyster card is the Mifare chip, made by Philips spin-off NXP.

Designed in the 1990s before processors of that size could handle strong encryption, Mifare has suffered at least three published cracks, according to security experts who have urged TfL to upgrade the system.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

CBA using facial recognition logins to verify disputed payments

CBA using facial recognition logins to verify disputed payments

Researchers demo AI-crippling GPUHammer attack

Researchers demo AI-crippling GPUHammer attack

Qantas obtains court order to prevent third-party access to stolen data

Qantas obtains court order to prevent third-party access to stolen data

Google Gemini for Workspace vulnerable to prompt injection attacks

Google Gemini for Workspace vulnerable to prompt injection attacks

Log In

  |  Forgot your password?