- The Security Primer Newsletter
- Posts
- April 15 - RFID Cloning and toll fee scam
April 15 - RFID Cloning and toll fee scam

Weekly Rundown
Happy Monday! Let’s recap some great highlights from last week and prime ourselves for the week ahead. 7 minute read.
Table of Contents
WHAT’S NEW
Alert: Beware of the toll fee scam.
Recently, a concerning wave of scamming attempts has been sweeping through the USA. Since early March 2024, the FBI’s Internet Crime Complaint Center (IC3) has recorded over 2,000 complaints concerning fraudulent smishing texts. These messages falsely claim you owe money for unpaid road tolls, and prompt you to pay via a link to a deceptive website that mimics state toll services. This link is designed to steal your personal information.
Here’s How to Stay Safe:
• Direct Verification: If you receive a text about toll fees, do not click any links. Instead, open your web browser and enter the official toll service website yourself to check for any actual outstanding amounts.
• Report the Scam: Help stop these fraudsters by reporting suspicious texts to the IC3 at www.ic3.gov. Include the originating phone number and the fraudulent website URL.
• Confirm with Customer Service: Always verify any payment requests by directly contacting the toll service’s official customer service number.
• Delete Suspicious Messages: Protect yourself by promptly deleting any texts that seem unusual or unsolicited.
• Protect Your Information: If you’ve interacted with a scam link, immediately take steps to secure your personal and financial information and watch for unusual account activity.
Stay vigilant and informed.
THINGS TO WATCH
IRAN Cyber threat
Iran’s cyber capabilities have significantly evolved, showcasing an array of sophisticated methods that pose serious threats to global networks. The Iranian government, particularly through entities like the Islamic Revolutionary Guard Corps (IRGC), has been actively engaging in cyber espionage and disruptive cyber-attacks. Recent activities include exploiting vulnerabilities in Microsoft Exchange and Fortinet to initiate ransomware attacks and unauthorized data access, reflecting a strategic approach to cyber warfare aimed at both data extortion and financial gain.
For instance, in a notable operation against Albania, Iranian state actors conducted cyber operations that disrupted government functions by deploying encryption and wiper attacks. These actions underscore Iran’s readiness to leverage cyber operations to assert geopolitical influence and pursue national security objectives.
The United States Cybersecurity and Infrastructure Security Agency (CISA) has documented these incidents and continues to issue advisories urging the adoption of robust cybersecurity measures to mitigate the risks posed by these advanced persistent threat (APT) actors. These advisories include recommendations for regular system updates, vigilant monitoring of network activity, and the implementation of strong security protocols to defend against such state-sponsored cyber threats.
SECURITY ENVIRONTMENT
RFID Cloning
Keycard copying, particularly of RFID and NFC access cards, has become a significant security concern as the tools and methods to perform such activities have become more accessible. Devices like the Flipper Zero can copy a wide range of signals, including RFID, NFC, Sub-GHz, and infrared, making it a popular choice for both legitimate security testing and unauthorized access. This device can capture and replicate the credentials of an access card in under a second, often without the cardholder ever noticing.
For individuals and organizations looking to protect themselves, it’s crucial to use encrypted cards and modern access control systems that can counteract these vulnerabilities. Higher frequency cards, like those operating at 13.56 MHz, offer more security than their 125 kHz counterparts due to the increased amount of data they can encrypt, making them harder to replicate without the proper cryptographic keys.
Despite the advancements in security, basic RFID copiers are still widely available and can clone simpler 125 kHz cards with ease. These devices are inexpensive, some tools are less than $10.00, and require minimal technical knowledge to operate, making them a tool of choice for quick cloning operations.
Educating yourself on the security features of your access control system and the potential threats is crucial. For more advanced protection, transitioning to systems that use mobile credentials and encrypted communication can provide a robust defense against unauthorized cloning and access.
For detailed insights into these processes and the security measures you can adopt, checking the comprehensive guides and discussions on RFID and NFC technology provided by sources like Kisi is highly beneficial.
THE AI SPACE
Otter.ai - your best friend in a meeting
Otter.ai revolutionizes meeting management by automating the creation of meeting minutes, enabling teams to focus more on discussion and less on note-taking. With Otter.ai, users can effortlessly record, transcribe, and summarize key discussions in real-time during meetings held on platforms like Zoom, Microsoft Teams, and Google Meet. The service integrates seamlessly with these platforms, ensuring that every word spoken is captured and converted into text without any manual input required from participants.
The tool’s intelligent capabilities extend to identifying speakers, highlighting key points, and even suggesting action items based on the dialogue. After the meeting, Otter.ai generates a concise summary along with a full transcript, which can be shared across teams to enhance collaboration and ensure everyone is aligned on the outcomes and next steps. This not only boosts productivity but also ensures that important details are retained and easily accessible for future reference.