Shuffle Up and Deal: Attacking Automated Card Shufflers
This talk demonstrates how to compromise automated card shufflers by exploiting insecure firmware, hardcoded credentials, and lack of secure boot. The researchers reverse-engineered the firmware of two popular casino card shufflers to manipulate the shuffling algorithm and exfiltrate card order data. The attack allows an adversary to predict the outcome of a poker hand by intercepting data via UART and transmitting it to a mobile device over Bluetooth. The presentation highlights significant security flaws in casino hardware and the potential for large-scale financial fraud.
How to Rig a Casino: Exploiting Automated Card Shufflers
TLDR: Researchers at Black Hat 2023 demonstrated that popular automated card shufflers are essentially insecure IoT devices running on outdated, unhardened firmware. By exploiting hardcoded credentials and a lack of secure boot, an attacker can manipulate the shuffling algorithm or exfiltrate real-time card order data. This research highlights a massive physical security gap where standard network-connected hardware lacks the basic protections expected in modern enterprise environments.
Casinos spend millions on surveillance, biometric scanners, and floor-level security to prevent cheating. Yet, the very devices responsible for the integrity of the game—the automated card shufflers sitting on every poker table—are often treated as "set and forget" appliances. The research presented at Black Hat 2023 on the Shuffle Master Deck Mate series proves that these devices are essentially black-box computers with the security posture of a 2005-era router.
The Anatomy of a Shuffler Compromise
The researchers focused on two models: the older Deck Mate 1 and the modern Deck Mate 2. Both devices rely on embedded microcontrollers—the Intel 8051 architecture for the DM1 and an NXP LPC1769 for the DM2—to manage the physical mechanics of shuffling.
The attack surface is surprisingly broad. These devices expose physical ports, including Ethernet and USB, which are often left accessible under the table. By dumping the firmware from the unencrypted NAND flash, the researchers found a goldmine of vulnerabilities. There is no secure boot, meaning the device will happily execute any code provided to it. Furthermore, the firmware update process is trivial to reverse-engineer. Because the update images are encrypted and signed using a hardcoded, universal key found in the system’s own shell scripts, an attacker can craft a malicious update package that the device will accept as legitimate.
Technical Execution: From UART to Mobile App
The most alarming part of the research is the ease with which an attacker can exfiltrate data. The DM2 uses a display module running an embedded Linux environment to handle the user interface. This module communicates with the control board via UART. By implanting a custom UART listener on the display board, the researchers were able to intercept the "shuffle" data in real-time.
Once the card order data is intercepted, it is trivial to transmit it over the network or via a connected device. The researchers demonstrated a proof-of-concept where a Raspberry Pi Zero, plugged into the device’s internal USB port, acted as a bridge. It forwarded the card order data to a mobile application via Bluetooth.
The following logic illustrates how the device tracks card positions, which the researchers manipulated to force specific cards into known locations:
// Simplified representation of the shuffling logic
// The shuffler generates an array of 52 positions
// and maps cards to these slots based on the RNG.
for (int i = 0; i < 52; i++) {
int target_slot = generated_random_position[i];
move_card_to_slot(card[i], target_slot);
}
By modifying the firmware to force specific cards into the bottom of the deck, an attacker can ensure that a "winning" hand is dealt to a specific player. Because the device is essentially a state machine, the researchers could also implement a "false shuffle" mode. In this mode, the shuffler performs the physical motions and makes the expected mechanical noises, but the internal logic simply skips the actual randomization, leaving the deck in its previous, known order.
Real-World Applicability for Pentesters
If you are conducting a physical security assessment or a red team engagement for a gaming operator, these devices should be high on your list. During a standard engagement, look for exposed ports under the table. If you can gain physical access for even a few minutes, you can dump the firmware or establish a persistent foothold.
The impact is not just theoretical. An attacker with this level of control doesn't need to be a master card mechanic; they just need a phone in their pocket and an accomplice at the table. The OWASP A07:2021 – Identification and Authentication Failures is the primary culprit here, as the lack of unique credentials and the presence of hardcoded keys make these devices trivial to compromise at scale.
Defensive Hardening
Defending against this requires a shift in how casinos view their hardware. First, physical access control is non-negotiable. If the ports are exposed, they must be physically blocked or alarmed. Second, operators must demand that vendors implement secure boot and cryptographically signed firmware updates that do not rely on universal, hardcoded keys. Finally, network segmentation is critical. These shufflers should never be on a network that can be reached from the public internet or even from general-purpose office VLANs.
Security in a casino is built on the assumption that the game is fair. When the hardware itself is compromised, that trust evaporates. As a researcher or pentester, the next time you walk into a card room, look under the table. You might find that the most important security device in the room is also the most vulnerable.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

