Sunday, September 23, 2012

Security researchers identify transit system exploit in San Fran and New Jersey, create app to prove it

[![Security researchers identify transit system exploit in San Fran and New Jersey, create app to prove it](http://www.blogcdn.com/www.engadget.com/media/2012/09/droidsubhack620pxhed.jpg) ](http://www.engadget.com/2012/09/23/android-hack-subways/)

Mobile security company Intrepidus Group presented evidence during the EUSecWest security conference potentially identifying a major flaw in at least two US transit systems. Creating an Android app named "UltraReset" and using it in tandem with an NFC-enabled Android phone (a [Nexus S](http://www.engadget.com/tag/nexuss), in this case), security researchers Corey Benninger and Max Sobell were able to reset and reuse -- free of charge -- transit access cards in both San Francisco's MUNI system and New Jersey's PATH system. Before you go getting any bad ideas, know that Benninger and Sobell haven't released the app for public use, and warned both transit systems in late 2011 (though neither region has fixed the exploit, the duo claim). PATH and MUNI share a common chip access card -- the Mifare Ultralight -- which can apparently be reset for 10 extra rides (as demonstrated on video below) via Android phones with NFC, an OS newer than 2.3.3 (Gingerbread). Starting to [sound familiar](http://www.engadget.com/2008/03/14/oyster-cards-vulnerable-to-rfid-hack-lots-of-other-systems-too/)?

Intrepidus is, however, releasing a modified version of the app, named "UltraCardTester." The modified app functions just like its nefarious progenitor, except it can't add time to cards (see it in action below). The app can tell you how many rides you have left, and if a system is open to exploit, but it won't assist you in _the act_ of exploiting. We reached out to both New Jersey's PATH and San Francisco MUNI on the issue, but have yet to hear back as of publishing.

[Continue reading _Security researchers identify transit system exploit in San Fran and New Jersey, create app to prove it_](http://www.engadget.com/2012/09/23/android-hack-subways/)

Filed under: [Cellphones](http://www.engadget.com/category/cellphones/), [Transportation](http://www.engadget.com/category/transportation/), [Wireless](http://www.engadget.com/category/wireless/), [Software](http://www.engadget.com/category/software/), [Mobile](http://www.engadget.com/category/mobile/)

[Security researchers identify transit system exploit in San Fran and New Jersey, create app to prove it](http://www.engadget.com/2012/09/23/android-hack-subways/) originally appeared on [Engadget](http://www.engadget.com) on Sun, 23 Sep 2012 19:48:00 EDT. Please see our [terms for use of feeds](http://www.weblogsinc.com/feed-terms/).

######

[Permalink](http://www.engadget.com/2012/09/23/android-hack-subways/)&nbsp_place_holder; &nbsp_place_holder;|&nbsp_place_holder; ![source](http://www.blogsmithmedia.com/www.engadget.com/media/post_label_source.gif)[IDG News Service](http://www.computerworld.com/s/article/9231500/Android_NFC_hack_enables_travelers_to_ride_subways_for_free_researchers_say?taxonomyId=85) &nbsp_place_holder;|&nbsp_place_holder;[Email this](http://www.engadget.com/forward/20330284/)&nbsp_place_holder;|&nbsp_place_holder;[Comments](http://www.engadget.com/2012/09/23/android-hack-subways/#comments)

URL: http://www.engadget.com/2012/09/23/android-hack-subways/

No comments:

Post a Comment