Nov13
Malware is short for malicious software, whose main purpose is to break into and disrupt computer systems. By extension, RFID malware is malware that is transmitted and executed via an RFID tag.
What are RFID Exploits?
An RFID exploit is malicious RFID tag data that “exploits” some part of the RFID system that encounters it. RFID systems are susceptable to hacker attacks, just like conventional computing systems. When an RFID reader scans a tag, it expects to get back information in a certain format. However, a malicious person can write carefully crafted data whose format and content is so unexpected that it can corrupt the RFID reader’s software and potentially its database as well.
What are RFID Worms?
An RFID worm is an RFID-based exploit that abuses a network connection to achieve self-replication. RFID worms may propagate by exploiting online RFID services, but can also spread via RFID tags. The RFID worm code causes unsuspecting RFID servers to download and execute some file from a remote location. This file then proceeds to compromise the RFID middleware server in the same fashion as most Internet-based malware. The worm infected RFID software can then “infect” new RFID tags by overwriting their data with a copy of the RFID worm code.
What are RFID Viruses?
An RFID virus is an RFID-based exploit that autonomously self-replicates its code to new RFID tags, without requiring a network connection. RFID viruses may or may not have a payload, which modifies or disrupts the workings of the back-end RFID system. Once the newly-infected RFID tags are sent on their way, they infect other RFID systems (assuming use of the same software system). These RFID systems then infect other RFID tags, which infect other RFID software systems, etc..