Why Proximity Cards Are Putting Your Organization at Risk of Account Takeovers
Speak With An Expert
The threat of account takeovers (ATOs) is becoming increasingly prevalent for businesses across industries with a majority (83%) of organizations in a research report indicating they had been impacted by an account takeover attack at least once over the past year. Once cybercriminals gain access to just one account it can take organizations an average of 11 months to resolve the breach.
And what is the most common entry point in breaches? Credential compromise caused by unsecure credential solutions. The widespread use of passwords and outdated credential technologies like proximity (prox) cards and iCLASS cards are putting organizations at risk and causing financial, operational and reputational fallout.
While the investment is significant and change management can be complex, the time to start the migration to more secure credentials is now. Be the organization that prioritizes proactive prevention versus having to deal with the cost of reactive damage control.
Account takeovers are a form of identity theft where attackers use stolen credentials to gain access to user accounts. These credentials can be obtained through various means, such as phishing, credential stuffing, and malware. For instance, phishing emails trick users into disclosing their login information, while credential stuffing involves using automated tools to test stolen credentials across multiple sites. Once inside, attackers can siphon funds, steal sensitive data, and even use the compromised accounts to launch further attacks.
The financial impact of ATOs is staggering. According to IBM, the average corporate breach costs nearly $5 million. Beyond the immediate financial losses, organizations also face long-term consequences such as damaged reputations, loss of customer trust, and potential legal liabilities.
While they were once the industry standard, prox and iCLASS cards are now among the weakest links in authentication. Proximity cards, commonly used for physical access control, operate at a low frequency (125 kHz) and lack encryption, making them highly susceptible to cloning and other attacks. These cards can be easily duplicated using inexpensive devices available online, allowing unauthorized individuals to gain access to secure areas, business applications and more.
iCLASS cards, while offering slightly better security than prox cards, are not immune to vulnerabilities. These cards use simple encryption methods that can be cracked with relative ease. For example,iCLASS SE reader configuration cards have been found to contain sensitive data that can be extracted and used to create malicious credentials. This makes iCLASS cards vulnerable to cloning, downgrade attacks, and unauthorized access.
The use of outdated credential technologies like prox and iCLASS cards poses significant risks to organizations. These risks include:
When analyzed on an industry-specific scale, outdated credentials can mean hospital patient data being accessed by unauthorized parties, supply chains being disrupted causing plants to pause operations or payment methods being exposed within retail and financial institutions.
Given the increasing threat of account takeovers and the vulnerabilities associated with prox and iCLASS cards, it is crucial for organizations to transition to more secure credential solutions. Modern credential technologies offer enhanced security features that can help mitigate the risks posed by outdated systems.
Investing in secure credential solutions not only helps protect against account takeovers but also ensures compliance with industry standards and enhances overall security posture. Moving to secure credentials is more than a hardware upgrade — it’s a strategic investment in your organization’s secure future.
Interested in learning how to start the transition to more secure credentials? Our white paper outlines why this transition should be a top security initiative with details on possible upgrade paths that could be right for your organization. Fill out the form below to receive the white paper in your inbox.