+44(1344 771569) mailtoinfo@acsltd.eu

Walk into thousands of offices, schools, warehouses, and commercial buildings across the UK and you’ll find the same thing on keyrings and lanyards:

125 kHz proximity fobs.

They’ve been the industry default for decades. They’re cheap, reliable… and trivially easy to clone using RFID Cloning.

What many facilities managers don’t realise is this:

If your system uses legacy proximity fobs, someone can copy a working credential in seconds — without touching the door, the panel, or the software.

No alarms. No forced entry. No visible sign anything happened.

Just a cloned fob… and a person walking through the front door.


Why legacy RFID cards are so easy to copy

Older technologies such as:

  • HID Prox (125 kHz)
  • EM4100 / EM4200
  • Early MIFARE Classic cards

all share the same flaw:

They transmit a fixed, unencrypted ID number.

A handheld copier (widely available online for a small cost) can:

  1. Read that number wirelessly from a pocket or lanyard
  2. Write it onto a blank fob
  3. Create a fully working duplicate in under 30 seconds

This isn’t “hacking” in the Hollywood sense.
It’s more like photocopying a barcode.


The uncomfortable truth about many sites

Two buildings can have identical readers and software.

  • One is secure
  • One can be bypassed by a cloned fob in seconds

The difference is the credential technology, not the brand of access control.

And during takeovers, upgrades, or maintenance, this is rarely audited.


How mobile credentials change the game

Image
Image

Modern mobile access, such as the system from Suprema, works in a completely different way.

With Suprema Mobile Credential:

  • The phone is not acting like a card
  • Communication uses encrypted BLE or secure NFC
  • There is no static ID to read or copy
  • Each interaction uses cryptographic challenge–response
  • Credentials are stored in the phone’s secure hardware enclave (the same protection used for Apple Pay / Google Pay)

When the reader asks for proof, the phone proves its identity without revealing any secret.

There is nothing to skim. Nothing to clone. Nothing to replay.


The “weakest credential” problem

Many sites install modern readers capable of high security… but still issue old fobs alongside mobile access.

If a user can open the door with:

  • Their smartphone or
  • A cheap 125 kHz fob

The site is still vulnerable.

Your security is defined by the weakest credential in circulation.


What a secure setup looks like

A genuinely secure modern access setup uses:

  • Mobile credentials for staff
  • Secure smart cards (e.g. DESFire) only where needed
  • No legacy proximity fobs in use

At that point, the common real-world cloning attack path is completely removed.


Why this is one of the highest-impact upgrades you can make

Upgrading readers, controllers, or software can be expensive and disruptive.

Moving from cloneable fobs to secure mobile credentials often requires none of that — just a change in how credentials are issued.

Yet it removes the single most common method used to bypass access control in real buildings.


The bottom line

Credential typeCan it be cloned?Risk level
125 kHz proximity fobsYes — in seconds🔴 Severe
MIFARE ClassicYes — with tools🟠 High
Secure smart cards (DESFire/iCLASS SE)No🟢 Very low
Suprema Mobile CredentialNo🟢 Extremely low

If you’re still issuing legacy fobs, your doors may be far easier to open than you think.

Mobile credentials don’t just add convenience.

They remove an entire class of security vulnerability from your site.


Want to know if your current system is at risk?

Audit the type of cards and fobs in circulation — not just the readers on the wall.

That’s where the real story is.