Feeds

Hotel blames burglaries on hacked Onity card locks

Black Hat demo exploited in the wild

Top 5 reasons to deploy VMware with Tegile

Updated A Texas hotel is claiming to have suffered multiple burglaries stemming from flaws in a common type of electronic lock, exploits for which were demonstrated at this year's Black Hat hacking conference.

In July, security researcher Cody Brocious showed how a device cobbled together from $50 worth of parts could be used to break into locks manufactured by Onity, which supplies some of the largest hotel chains in the world. The device plugs into the data port on the locks and opens them by defeating poor crypto in the locking system.

Now the Hyatt hotel in Houston's Galleria complex has told Forbes that its guests suffered a string of break-ins in September, and that it had identified the hacking of its Onity locks as the method used. 27-year-old Matthew Allen Cook has been arrested for the break-ins and is helping the police with their inquiries.

"We will vigorously defend these charges, and all the facts will be available after the trial," Cook's lawyer said.

The hotel owners say they became aware of the issue with Onity locks in August and were working with the company on a fix when the thefts took place. At the time of the Black Hat presentation, Onity called the hack "unreliable, and complex to implement," but it appears not too complex for others to imitate.

So far Onity has offered two workarounds – covering up the data port with screws that are difficult to remove, or replacing the entire circuit board of the lock, which the manufacturer wants hotels to pay for themselves.

The hotel said it had been taking steps to mitigate the flaw but the robberies occurred before this had been done. It was eventually reduced to posting a physical guard in reception to try and deter thefts, in addition to gumming up the data port of the locks with epoxy glue.

Insurance firm Petra Risk Solutions issued an alert to its customers on the Onity locks last month, but said that around a fifth of its customers have yet to deal with the issue. Todd Seiders, director of risk management at Petra, said the company was already aware of other cases of theft using the hack.

"We're expecting incidents in which these devices are used to explode nationally," he said. "As crooks find success with it, they’re going to go back to the Internet and say 'hey, it works. I was able to break into ten rooms.' And then others build it and try it. We're going to get hit hard over the next year." ®

Update

"Onity places the highest priority on the safety and security provided by its products. Immediately following the hacker’s public presentation of illegal methods of breaking into hotel rooms, Onity engineers quickly developed both mechanical and technical solutions to address the issue," the company said in an emailed statement.

"These solutions have been tested and validated by two independent security firms, and are available to customers worldwide. All requests for these solutions have already been fulfilled, or are in the process of being fulfilled."

Internet Security Threat Report 2014

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.