{"id":97916,"date":"2020-01-06T21:01:14","date_gmt":"2020-01-07T05:01:14","guid":{"rendered":"\/blogs\/?p=97916"},"modified":"2024-06-26T01:04:37","modified_gmt":"2024-06-26T08:04:37","slug":"the-cloning-of-the-ring-who-can-unlock-your-door","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/","title":{"rendered":"The Cloning of The Ring \u2013 Who Can Unlock Your Door?"},"content":{"rendered":"<p><em>Steve Povolny contributed to this report.<\/em><\/p>\n<p>McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly every industry vertical. Special interest in the consumer space and Internet of Things (IoT) led to the discovery of an insecure design with the McLear NFC Ring a household access control device. The NFC Ring can be used to interact with NFC-enabled door locks which conform to the ISO\/IEC 14443A NFC card type. Once the NFC Ring has been paired with the NFC enabled door lock, the user can access their house by simply placing the NFC Ring within NFC range of the door lock.<\/p>\n<p><a href=\"https:\/\/store.nfcring.com\/pages\/our-journey\" target=\"_blank\" rel=\"noopener noreferrer\">McLear<\/a> originally invented the <a href=\"https:\/\/nfcring.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">NFC Ring<\/a> to replace traditional keys with functional jewelry. The NFC Ring uses near field communication (NFC) for access control, to unlock and control mobile devices, share and transfer information, link people and much more. McLear NFC Ring aims to redefine and modernize access control to bring physical household security through convenience. Their latest ring also supports payment capability with McLear Smart Payment Rings, which were not in scope for this research.<\/p>\n<p>Identity is something which uniquely identifies a person or object; an NFC tag is a perfect example of this. Authentication can be generally classified into three types; something you know, something you have and something you are. A NFC Ring is different from the general NFC access tag devices (something you have) as the Ring sits on your finger, so it is a hybrid authentication type of something you have and something you are. This unique combination, as well as the accessibility of a wearable Ring with NFC capabilities sparked our interest in researching this product as an NFC-enabled access control device. Therefore, the focus of our research was on NFC Ring protection against cloning as opposed to the door lock, since NFC access control tags and door locks have been well-<a href=\"https:\/\/www.nccgroup.trust\/us\/about-us\/newsroom-and-events\/blog\/2012\/september\/unlocking-nfc-deadbolts-with-androids\/\" target=\"_blank\" rel=\"noopener noreferrer\">researched<\/a>.<\/p>\n<p>The research and findings for this flaw were reported to McLear on September 25, 2019. To date, McAfee Advanced Threat Research has not received a response from the vendor.<\/p>\n<h2>Duplicating Keys Beyond the Hardware Store<\/h2>\n<p>In the era of Internet of Things (IoT), the balance between security and convenience is an important factor to get right during the concept phase of a new product and the bill of materials (BOM) selection. The hardware selection is critical as it often determines the security objectives and requirements that can be fulfilled during design and implementation of the product lifecycle. The NFC Ring uses an NFC capable Integrate Circuit (IC) which can be easily cloned and provides no security other than NFC proximity. The NFC protocol does not provide authentication and relies on its operational proximity as a form of protection. The problem with NFC Tags is that they automatically transmit their UID when in range of NFC device reader without any authentication.<\/p>\n<p>Most consumers today use physical keys to secure access to their household door. The physical key security model requires an attacker to get physical access to the key or break the door or door lock. The NFC Ring, if designed securely, would provide equal or greater security than the physical key security model. However, since the NFC Ring can be easily cloned without having to attain physical access to the Ring, it makes the product\u2019s security model less secure than a consumer having a physical key.<\/p>\n<p>In this blog we discuss cloning of the NFC Ring and secure design recommendations to improve its security to a level equal to or greater than existing physical keys.<\/p>\n<h2>NFC Ring Security Model and Identity Theft<\/h2>\n<p>All McLear non-payment NFC Rings using NTAG216 ICs are impacted by this design flaw. Testing was performed specifically on the <a href=\"https:\/\/store.nfcring.com\/products\/opn?variant=500585103361\" target=\"_blank\" rel=\"noopener noreferrer\">OPN<\/a> which has an NTAG216 IC. The NFC Ring uses the <a href=\"https:\/\/www.nxp.com\/docs\/en\/data-sheet\/NTAG213_215_216.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NTAG 216<\/a> NFC enabled Integrated Circuit (IC) to provide secure access control by means of NFC communication.<\/p>\n<p>The NFC protocol provides no security as it\u2019s just a transmission mechanism. \u00a0The onus is on product owners to responsibly design and implement a security layer to meet the security objectives, capable of thwarting threats identified during the threat modeling phase at concept commit.<\/p>\n<p>The main threats against an NFC access control tag are physical theft and tag cloning by NFC. At a minimum, a tag should be protected against cloning by NFC; with this research, it would ensure the NFC Ring provides the <em>same<\/em> level of security as a physical key. Ideal security would also protect against cloning even when the NFC Ring has been physically stolen which would provide <em><u>greater<\/u><\/em> security than that of a physical key.<\/p>\n<p>The NTAG216 IC provide the following security per the <a href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0259\/9785\/t\/17\/assets\/NFC_Ring_Datasheet_Eclipse.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NFC Ring spec<\/a>:<\/p>\n<ol>\n<li>Manufacturer programmed 7-byte UID for each device<\/li>\n<li>Pre-programmed capability container with one-time programmable bits<\/li>\n<li>Field programmable read-only locking function<\/li>\n<li>ECC based originality signature<\/li>\n<li>32-bit password protection to prevent unauthorized memory operations<\/li>\n<\/ol>\n<p>The NFC Ring security model is built on the \u201cManufacturer programmed 7-byte UID for each device\u201d as the Identity and Authentication with the access control principle or door lock. This 7-byte UID (unique identifier) can be read by any NFC enabled device reader such as a <a href=\"https:\/\/proxmark.com\/proxmark-3-hardware\/proxmark-3-rdv4\" target=\"_blank\" rel=\"noopener noreferrer\">proxmark3<\/a> or mobile phone when within NFC communication range.<\/p>\n<p>The NFC Ring security model can be broken by any NFC device reader when they come within NFC communication range since the static 7-byte UID is automatically transmitted without any authentication. Once the 7-byte UID has been successfully read, a <a href=\"https:\/\/lab401.com\/products\/ntag-compatible-21x\" target=\"_blank\" rel=\"noopener noreferrer\">magic NTAG card<\/a> can be programmed with the UID, which forms a clone of the NFC Ring and allows an attacker to bypass the secure access control without attaining physical access to the NFC Ring.<\/p>\n<p>The NFC Ring is insecure by design as it relies on the static 7-byte UID programmed at manufacture within the NTAG216 for device identity and authentication purposes. The NFC Ring security model relies on NFC proximity and a static identifier which can be cloned.<\/p>\n<p>In addition, we discovered that the UIDs across NFC Rings maybe predictable (this was a very small sample size of three NFC Rings):<\/p>\n<ul>\n<li>NFC Ring#1 UID 04d0e722993c80<\/li>\n<li>NFC Ring#2 UID 04d24722993c80<\/li>\n<li>NFC Ring#3 UID 04991c4a113c80<\/li>\n<\/ul>\n<p>There is only a 22-byte difference between the UID of NFC Ring#1 and NFC Ring#2 (0x24-0x0e). By social engineering when a victim purchased their NFC Ring, an attacker could purchase a significant sample size of NFC Rings around the same time and possibly brute force their NFC Ring UID.<\/p>\n<h2>Social Engineering<\/h2>\n<p>Social Engineering consists of a range of techniques which can be used through human interaction for many malicious purposes such as identity theft. In the case of the NFC Ring the goal is to steal the user\u2019s identity and gain access to their home. Reconnaissance can be performed online to gain background information such as what type of technology is being used by the victim for their home access.<\/p>\n<p>One of the most common exchanges of technology today has become the passing of a phone between two untrusted parties to take a picture. The NFC Ring social engineering attack could be as simple as requesting the victim to take a picture with the attacker-supplied phone. The victim-as-helpful-photographer holds the attacker\u2019s phone, which can read NFC tags and could be equipped with a custom Android app to read the NFC Ring UID, all transparent to the victim while they are snapping away. There is no sign to the victim that their NFC Ring is being read by the phone. It is recorded in the system log and cannot be viewed until a USB cable is attached with required software. Once the Ring is compromised, it can be reprogrammed on a standard writable card, which can be used to unlock smart home locks that partner with this product. The victim\u2019s home is breached.<\/p>\n<h2>How It\u2019s Done: NFC Ring Cloning<\/h2>\n<p>To successfully clone an NFC Tag, one must first identify the Tag type. This can be done by looking up the product specifications in some cases, or verifying by means of an NFC device reader such as a <a href=\"https:\/\/proxmark.com\/proxmark-3-hardware\/proxmark-3-rdv4\" target=\"_blank\" rel=\"noopener noreferrer\">proxmark3<\/a>.<\/p>\n<p>From the <a href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0259\/9785\/t\/17\/assets\/NFC_Ring_Datasheet_Eclipse.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NFC Ring specs<\/a> we can determine most of the required tag characteristics:<\/p>\n<ol>\n<li>IC Model: NTAG216<\/li>\n<li>Operating Frequency: 13.56Mhz<\/li>\n<li>ISO\/IEC: 14443A<\/li>\n<li>User writable space: 888 bytes<\/li>\n<li><a href=\"https:\/\/www.nxp.com\/docs\/en\/data-sheet\/NTAG213_215_216.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Full specifications<\/a><\/li>\n<\/ol>\n<p>In addition, by communicating with a <a href=\"https:\/\/proxmark.com\/proxmark-3-hardware\/proxmark-3-rdv4\" target=\"_blank\" rel=\"noopener noreferrer\">proxmark3<\/a> attackers can physically verify the NFC Tag characteristics and obtain the UID which is required for cloning.<\/p>\n<p>The most straightforward method to stealing the unique identifier of the Ring would be through a mobile phone. The following steps were taken in the below demo:<\/p>\n<ol>\n<li><a href=\"https:\/\/lab401.com\/blogs\/academy\/magic-ntag-21x-getting-started\" target=\"_blank\" rel=\"noopener noreferrer\">Reading of NFC Ring with proxmark3 and cloning NTAG21x emulator card<\/a><\/li>\n<li>Setting attacker\u2019s phone to silent to prevent NFC Tag detection sound<\/li>\n<li>Running our customized Android app to prevent Android activity popup when NFC Tag detected and read.<\/li>\n<\/ol>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/nqi42aSQIKY\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2>Mitigation Secure Design Recommendations<\/h2>\n<p><strong>Lock the door<\/strong>. The existing insecure design can be mitigated by using NFC Doorlock password protection in combination with the NFC Ring for two factor authentication.<\/p>\n<p><strong>Authenticate.<\/strong> NFC Ring designers must mandate a secure PKI design with an NFC Tag which contains a crypto module that provides TAG authentication. The NFC Ring secure design must mandate a security layer on top of NFC to access control device manufacturers to ensure secure and trustworthy operation.<\/p>\n<p><strong>Randomize UIDs.<\/strong> In addition, the NFC designers must ensure they are not manufacturing NFC Rings with sequential UIDs which may be predictable with purchase date.<\/p>\n<h2>Consumer Awareness<\/h2>\n<p>To make customers aware of the security risks associated with products available on the market, product manufacturers should clearly state the level of security which their product provides in comparison with the technology or component they claim to be advancing. Are customers holding the master key to unlock their door, and are there duplicates?<\/p>\n<p>In the case of the NFC Ring, while convenient, it clearly does not provide the same level of security to consumers as a physical key. This decrease in security model from a physical key to a NFC Ring is not due to technology limitations but due to an insecure design.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly&#8230;<\/p>\n","protected":false},"author":1061,"featured_media":97078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5657],"class_list":["post-97916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Cloning of The Ring \u2013 Who Can Unlock Your Door? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cloning of The Ring \u2013 Who Can Unlock Your Door? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-07T05:01:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-26T08:04:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"664\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eoin Carroll\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@w3knight\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eoin Carroll\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\"},\"author\":{\"name\":\"Eoin Carroll\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d\"},\"headline\":\"The Cloning of The Ring \u2013 Who Can Unlock Your Door?\",\"datePublished\":\"2020-01-07T05:01:14+00:00\",\"dateModified\":\"2024-06-26T08:04:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\"},\"wordCount\":1684,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\",\"name\":\"The Cloning of The Ring \u2013 Who Can Unlock Your Door? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg\",\"datePublished\":\"2020-01-07T05:01:14+00:00\",\"dateModified\":\"2024-06-26T08:04:37+00:00\",\"description\":\"Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg\",\"width\":1000,\"height\":664},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Cloning of The Ring \u2013 Who Can Unlock Your Door?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d\",\"name\":\"Eoin Carroll\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b189b41d5342c1f01c13b31cd502abee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg\",\"caption\":\"Eoin Carroll\"},\"description\":\"Eoin Carroll is a Principal Engineer and Senior Vulnerability Researcher on the McAfee Advanced Threat Research team, focused on researching the trustworthiness of emerging computing platforms and protocols. He also analyzes critical industry vulnerabilities and innovates advanced threat defenses. He has 20 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles. For the first decade of his career he worked as an electronic engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience. During the second decade he has been building his career in platform security through Product Security, reverse engineering critical industry vulnerabilities and designing exploit protections. In addition, he has lead Product Security teams, mentored many Product Security Engineers\/Architects, supported local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent. He is very passionate about analyzing the security models of emerging platforms and protocols against the current and future threat landscape. His work experience includes threat modeling, secure platform design, memory forensics, vulnerability and exploit analysis, reverse engineering, product engineering, operating system internals and incident response.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/eoin-carroll-641ba08\/\",\"https:\/\/x.com\/w3knight\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/eoin-carroll\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cloning of The Ring \u2013 Who Can Unlock Your Door? | McAfee Blog","description":"Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Cloning of The Ring \u2013 Who Can Unlock Your Door? | McAfee Blog","og_description":"Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-01-07T05:01:14+00:00","article_modified_time":"2024-06-26T08:04:37+00:00","og_image":[{"width":1000,"height":664,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg","type":"image\/jpeg"}],"author":"Eoin Carroll","twitter_card":"summary_large_image","twitter_creator":"@w3knight","twitter_site":"@McAfee","twitter_misc":{"Written by":"Eoin Carroll","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/"},"author":{"name":"Eoin Carroll","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d"},"headline":"The Cloning of The Ring \u2013 Who Can Unlock Your Door?","datePublished":"2020-01-07T05:01:14+00:00","dateModified":"2024-06-26T08:04:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/"},"wordCount":1684,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/","name":"The Cloning of The Ring \u2013 Who Can Unlock Your Door? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg","datePublished":"2020-01-07T05:01:14+00:00","dateModified":"2024-06-26T08:04:37+00:00","description":"Steve Povolny contributed to this report. McAfee\u2019s Advanced Threat Research team performs security analysis of products and technologies across nearly","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_659528155.jpg","width":1000,"height":664},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Cloning of The Ring \u2013 Who Can Unlock Your Door?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6e361f03260be663c75dcf535cf8594d","name":"Eoin Carroll","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b189b41d5342c1f01c13b31cd502abee","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Eoin-Carroll-Pic-1-96x96.jpg","caption":"Eoin Carroll"},"description":"Eoin Carroll is a Principal Engineer and Senior Vulnerability Researcher on the McAfee Advanced Threat Research team, focused on researching the trustworthiness of emerging computing platforms and protocols. He also analyzes critical industry vulnerabilities and innovates advanced threat defenses. He has 20 years of diverse experience, from electronic engineering to a variety of offensive and defensive security roles. For the first decade of his career he worked as an electronic engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience. During the second decade he has been building his career in platform security through Product Security, reverse engineering critical industry vulnerabilities and designing exploit protections. In addition, he has lead Product Security teams, mentored many Product Security Engineers\/Architects, supported local universities to keep their security curriculum relevant to industry needs and regularly speaks at universities and STEM events to inspire the next generation of security talent. He is very passionate about analyzing the security models of emerging platforms and protocols against the current and future threat landscape. His work experience includes threat modeling, secure platform design, memory forensics, vulnerability and exploit analysis, reverse engineering, product engineering, operating system internals and incident response.","sameAs":["https:\/\/www.linkedin.com\/in\/eoin-carroll-641ba08\/","https:\/\/x.com\/w3knight"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/eoin-carroll\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1061"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97916"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97916\/revisions"}],"predecessor-version":[{"id":195314,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97916\/revisions\/195314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/97078"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97916"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}