Newly released tool grabs credit card account ID data off magnetic strips, RFID chips

WASHINGTON -- BLACK HAT DC 2008 -- Ever wonder what’s on that magnetic strip on your credit card? Researcher Adam Laurie did, and here today at Black Hat DC he demonstrated and released a tool he developed for hacking credit-card mag strips as well as RFID chips implanted in some cards.

Laurie, best known for his Rfidiot set of tools for hacking all things RFID (building passes, animal ID tags, passports, etc.), showed how his new Chapy tool could find account identification data stored on a credit card. Chapy is a Python-based script Laurie wrote that works with a card reader to scan and clone the data stored on the credit card.

“I had been wondering what was on my credit card,” says Laurie, whose tool for now only works with Personal Computer/Smart Card (PCSC)-based technology.

Chapy finds the account identification information, including the primary account number, expiration date, and the card owner’s name, for instance, so an attacker could easily clone the credit card, Laurie notes.

The tool also can hack cards with RFID tags, such as American Express cards, which he demonstrated here. “I didn’t need any authentication or PIN number,” he says.

Laurie says American Express told him the account number he gets with the hack isn’t the primary one, however, nor does the card store the name of the cardholder. But in his live demo, Chapy did display the account holder’s name. “And I’ve been told you can use this account number for online transactions,” he notes.

Chapy is still “very much a work-in-progress,” he says, and will be available on the Rfidiots site today.

In another demo during his presentation here, Laurie hammed it up a bit by cloning a "surgically-implanted" RFID tag (actually an RFID tag embedded in his watch) with an animal ID tag, using his existing Rfidiot tools.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights