Feeds

Hotel blames burglaries on hacked Onity card locks

Black Hat demo exploited in the wild

Internet Security Threat Report 2014

Updated A Texas hotel is claiming to have suffered multiple burglaries stemming from flaws in a common type of electronic lock, exploits for which were demonstrated at this year's Black Hat hacking conference.

In July, security researcher Cody Brocious showed how a device cobbled together from $50 worth of parts could be used to break into locks manufactured by Onity, which supplies some of the largest hotel chains in the world. The device plugs into the data port on the locks and opens them by defeating poor crypto in the locking system.

Now the Hyatt hotel in Houston's Galleria complex has told Forbes that its guests suffered a string of break-ins in September, and that it had identified the hacking of its Onity locks as the method used. 27-year-old Matthew Allen Cook has been arrested for the break-ins and is helping the police with their inquiries.

"We will vigorously defend these charges, and all the facts will be available after the trial," Cook's lawyer said.

The hotel owners say they became aware of the issue with Onity locks in August and were working with the company on a fix when the thefts took place. At the time of the Black Hat presentation, Onity called the hack "unreliable, and complex to implement," but it appears not too complex for others to imitate.

So far Onity has offered two workarounds – covering up the data port with screws that are difficult to remove, or replacing the entire circuit board of the lock, which the manufacturer wants hotels to pay for themselves.

The hotel said it had been taking steps to mitigate the flaw but the robberies occurred before this had been done. It was eventually reduced to posting a physical guard in reception to try and deter thefts, in addition to gumming up the data port of the locks with epoxy glue.

Insurance firm Petra Risk Solutions issued an alert to its customers on the Onity locks last month, but said that around a fifth of its customers have yet to deal with the issue. Todd Seiders, director of risk management at Petra, said the company was already aware of other cases of theft using the hack.

"We're expecting incidents in which these devices are used to explode nationally," he said. "As crooks find success with it, they’re going to go back to the Internet and say 'hey, it works. I was able to break into ten rooms.' And then others build it and try it. We're going to get hit hard over the next year." ®

Update

"Onity places the highest priority on the safety and security provided by its products. Immediately following the hacker’s public presentation of illegal methods of breaking into hotel rooms, Onity engineers quickly developed both mechanical and technical solutions to address the issue," the company said in an emailed statement.

"These solutions have been tested and validated by two independent security firms, and are available to customers worldwide. All requests for these solutions have already been fulfilled, or are in the process of being fulfilled."

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.