ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1832

Hackers Found Backdoor in High-Security Safes—Opens in Seconds

Threat Score:
63
2 articles
96.0% similarity
2 days ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Article Timeline

2 articles
Click to navigate
Aug 08
Aug 10
Oldest
Latest

Key Insights

1
Security researchers discovered backdoor vulnerabilities in high-security electronic safes, including Securam Prologic locks, allowing unauthorized access in seconds.
2
The vulnerabilities affect at least eight brands of electronic safes, with the backdoor initially designed for locksmiths exploited by hackers for unauthorized access.
3
James Rowley stated, 'How is it possible that there's this physical security product, and somebody else has the keys to the kingdom?' highlighting the shocking ease of access.
4
A secondary vulnerability allows digital safecrackers to obtain unlock codes by inserting a tool into a hidden port in the lock, significantly compromising security.
5
The research was prompted by a 2021 incident where Liberty Safe provided the FBI access to a safe, raising alarming questions about user privacy and security.
6
Experts emphasize that these vulnerabilities indicate a critical need for better security protocols in physical lock systems, particularly those used for sensitive items like firearms.

Threat Overview

Security researchers have uncovered significant vulnerabilities in high-security electronic safes, specifically affecting Securam Prologic locks used in various brands, including Liberty Safe. The vulnerabilities allow unauthorized access to safes in mere seconds, raising concerns about the security of items stored within, such as firearms and narcotics. James Rowley and Mark Omo, the researchers, initiated their investigation after learning that Liberty Safe had provided the FBI with a code to open a safe related to the January 6 Capitol incident. Rowley noted, 'How is it possible that there's this physical security product, and somebody else has the keys to the kingdom?' This statement reflects the shocking implications of the findings. Their research revealed two major vulnerabilities: one is a backdoor intended for locksmiths that can be exploited by hackers, and the other involves a hidden port in the lock that allows for the immediate retrieval of a safe’s unlock code. The vulnerabilities affect at least eight brands of electronic safes, significantly undermining the perceived security of these devices. The researchers highlighted that the ease of access through these vulnerabilities poses a severe risk to users. In the context of these findings, experts are calling for enhanced security protocols for high-security locks, especially considering their use in securing sensitive items. Rowley and Omo's findings have prompted discussions within the security community regarding the need for manufacturers to address these vulnerabilities promptly. As the investigation continues, security professionals are urging users of electronic safes to remain vigilant and consider additional security measures. The researchers have not yet disclosed specific model numbers or version details that are affected, but the implications of their findings are profound, particularly for those who rely on these devices for safeguarding valuable or dangerous items. The industry response may include updates and patches from manufacturers to address these vulnerabilities, and users are encouraged to monitor developments closely.

Tactics, Techniques & Procedures (TTPs)

T1203
Exploit Public-Facing Application - Attackers exploit the backdoor in electronic locks to gain unauthorized access to safes [1][2]
T1059.007
JavaScript/JScript - Tools used to insert into the hidden port to extract unlock codes [1][2]
T1557
Adversary-in-the-Middle - The backdoor allows hackers to intercept access intended for locksmiths [1][2]
T1053
Scheduled Task/Job - Potential for persistence through unauthorized access methods [1][2]
T1003
OS Credential Dumping - Hackers can extract secure codes directly from the lock's system [1][2]

Timeline of Events

2021-01-06
Liberty Safe provides access code to FBI for a safe related to the Capitol incident [2]
2023-06
Rowley and Omo begin their investigation into backdoor access in electronic safes [1]
2023-08
Researchers announce findings on the vulnerabilities, highlighting the ease of unauthorized access [1][2]
2023-08-10
Full details of vulnerabilities made public, prompting industry discussions on security measures [1]

Source Citations

expert_quotes: {'James Rowley': 'Article 2'}
primary_findings: {'Backdoor vulnerabilities in electronic safes': 'Articles 1, 2'}
technical_details: {'Exploitation methods and vulnerabilities': 'Articles 1, 2'}
Powered by ThreatCluster AI
Generated 2 days ago
AI analysis may contain inaccuracies

Related Articles

2 articles
1

Hackers Found Backdoor in High-Security Safes—Opens in Seconds

Spybusters • 2 days ago

Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics. James Rowley and Mark Omo got curious a scandal in the world of electronic safes... In the process, they'd find something far bigger: another form of backdoor intended to let authorized locksmiths open not just Liberty Safe devices, but the high-security Securam Prologic locks used in many of Liberty’s safes and those of at least seven other brands.  More

Score
53
99.0% similarity
Read more
2
Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

Wired • 4 days ago

two yearsago, security researchers James Rowley and Mark Omo got curious ascandal in the world of electronic safes: Liberty Safe, which markets itself as “America’s #1 heavy-duty and gun safe manufacturer,” had apparently given the FBI a code that allowed agents to open a criminal suspect's safe in response to a warrant related to theJanuary 6, 2021, invasion of the US Capitol building. Politics aside, Rowley and Omo were taken aback to read that it was so easy for law enforcement to penetrate a

Score
44
99.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

INDUSTRIES
Manufacturing
Security
MITRE ATT&CK
T1203
T1053
T1003
T1059
T1557
VULNERABILITIES
Backdoor Access
Physical Security Compromise
ATTACK TYPES
Unauthorized Access
Lock Manipulation
COMPANIES
Securam
Liberty Safe
AGENCIES
FBI
CLUSTER INFORMATION
Cluster #1832
Created 2 days ago
Semantic Algorithm

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration