{"id":79813,"date":"2016-03-23T17:45:53","date_gmt":"2016-03-23T21:45:53","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-10-28T14:01:04","modified_gmt":"2022-10-28T18:01:04","slug":"fake-fingerprints-open-galaxy","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/fake-fingerprints-open-galaxy\/","title":{"rendered":"Fake Fingerprints Can Open Your Phone"},"content":{"rendered":"<p><strong>&#8211; Updated 03-30-2016 &#8211;<\/strong> The <em><a href=\"http:\/\/www.businessinsider.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Business Insider<\/a><\/em> <a href=\"http:\/\/www.businessinsider.com\/heres-how-easy-it-is-to-get-past-an-iphones-fingerprint-sensor-2016-2\" target=\"_blank\" rel=\"noopener noreferrer\">proves<\/a> that you can use <strong>Play-Doh<\/strong> to fool the fingerprint sensor in your Phone.<\/p>\n<p style=\"text-align: center;\">&#8212;<\/p>\n<p><a href=\"http:\/\/betanews.com\/2014\/07\/16\/choose-bad-passwords-and-reuse-them-often-says-microsoft\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105329\" title=\"Fake Fingerprints Open Galaxy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_bad2-e1569094704869-96x150.jpg?resize=61%2C95&#038;ssl=1\" alt=\"Fake Fingerprints Open Galaxy\" width=\"61\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_bad2-e1569094704869.jpg?resize=96%2C150&amp;ssl=1 96w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_bad2-e1569094704869.jpg?resize=48%2C75&amp;ssl=1 48w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/password_bad2-e1569094704869.jpg?w=354&amp;ssl=1 354w\" sizes=\"auto, (max-width: 61px) 100vw, 61px\" \/><\/a>I have <a href=\"https:\/\/wp.me\/p2wgaW-fiM\" target=\"_blank\" rel=\"noopener noreferrer\">pointed<\/a> <a href=\"https:\/\/wp.me\/p2wgaW-kq6\" target=\"_blank\" rel=\"noopener\">out a<\/a> number of times that biometrics will not be the complete final solution for passwords.\u00a0<strong>Biometrics<\/strong> is the measurement and statistical analysis of people&#8217;s physical and behavioral characteristics. The technology is mainly used for <strong>identification and access control.<\/strong> The basic premise of <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometric-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">biometric authentication<\/a> is that everyone is unique. An individual can be identified by his or her intrinsic physical or behavioral traits.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105332\" title=\"Fake Fingerprints Can Open Your Phone\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometric_logo-1-e1569094814427-150x109.jpg?resize=117%2C85&#038;ssl=1\" alt=\"Fake Fingerprints Can Open Your Phone\" width=\"117\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometric_logo-1-e1569094814427.jpg?resize=150%2C109&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometric_logo-1-e1569094814427.jpg?resize=75%2C54&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/biometric_logo-1-e1569094814427.jpg?w=483&amp;ssl=1 483w\" sizes=\"auto, (max-width: 117px) 100vw, 117px\" \/><\/strong>There is a <strong>huge issue with biometrics.\u00a0 You can&#8217;t change your intrinsic physical or behavioral traits<\/strong> if they get stolen or hacked. Well, now there is more proof that biometrics can be hacked without cutting off a finger.<\/p>\n<h3>Hack mobile phone\u00a0authentication<\/h3>\n<p>Two smarty Sparty&#8217;s from <a href=\"https:\/\/msu.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Michigan State University<\/strong>\u2019s<\/a> <a href=\"http:\/\/biometrics.cse.msu.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">biometrics group<\/a> has figured out a way to <strong>hack mobile phone <a title=\"Fingerprint recognition\" href=\"http:\/\/en.wikipedia.org\/wiki\/Fingerprint_recognition\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">fingerprint authentication<\/a>.<\/strong> According to <em><a href=\"https:\/\/www.helpnetsecurity.com\/2016\/03\/07\/hack-a-mobile-phones-fingerprint-sensor-in-15-minutes\/\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/em>, the MSU researchers can hack your secure phone by using just a scanner, a color inkjet printer, a special type of paper, and ink.<\/p>\n<p><a href=\"http:\/\/www.pabr.org\/pcbprt\/pcbprt.en.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105334 size-medium\" title=\"AgIC silver conductive ink cartridges\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/printer_2d.jpg?resize=150%2C90&#038;ssl=1\" alt=\"AgIC silver conductive ink cartridges\" width=\"150\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/printer_2d.jpg?resize=150%2C90&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/printer_2d.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/printer_2d.jpg?w=556&amp;ssl=1 556w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Turns out that the attack is easy to execute.\u00a0The first step is to scan the target\u2019s <strong>fingerprint<\/strong> image at 300 dpi or higher resolution. Then, the image is mirrored and the original or binarized fingerprint image is <strong>printed<\/strong> on the glossy side of an AgIC special paper. The printer uses\u00a0<strong>AgIC silver <\/strong><strong><a title=\"Conductive ink\" href=\"http:\/\/en.wikipedia.org\/wiki\/Conductive_ink\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">conductive ink<\/a><\/strong> cartridges (along with normal black ink).<\/p>\n<h3>Magical conductive ink<\/h3>\n<p><em>CrunchBase<\/em>\u00a0<a href=\"https:\/\/web.archive.org\/web\/20150204080217\/http:\/\/www.crunchbase.com:80\/organization\/agic-inc\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a> that advances in material science have made it possible to manufacture almost magical conductive ink. AgIC silver conductive ink\u00a0has <strong>tiny silver particles<\/strong> and can be purchased <a href=\"https:\/\/web.archive.org\/web\/20161030013014\/https:\/\/shop.agic.cc\/products\/circuit-printer-cartridge-set\" target=\"_blank\" rel=\"noopener noreferrer\">online<\/a>. The ink is printed by<strong> standard <\/strong><strong><a href=\"http:\/\/www.brother-usa.com\/Printer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brother<\/a> <a href=\"https:\/\/web.archive.org\/web\/20161030013014\/https:\/\/shop.agic.cc\/products\/circuit-printer-cartridge-set\" target=\"_blank\" rel=\"noopener noreferrer\">printers<\/a><\/strong>. The ink dries in a few seconds and conductivity emerges instantly when the traces are drawn on special photo inkjet printing paper also available <a href=\"https:\/\/web.archive.org\/web\/20170419163341\/https:\/\/shop.agic.cc\/products\/a4-circuit-paper-10-sheets\" target=\"_blank\" rel=\"noopener noreferrer\">online<\/a>.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105336\" title=\"spoofed fingerprint\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_fingerprint.png?resize=90%2C90&#038;ssl=1\" alt=\"spoofed fingerprint\" width=\"90\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_fingerprint.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_fingerprint.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_fingerprint.png?w=370&amp;ssl=1 370w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/>All in all, an attacker can have a <strong>spoofed fingerprint<\/strong> that would allow him to<strong> access<\/strong> a <strong>phone<\/strong> protected with fingerprint authentication in less than 15 minutes, and the cost of all the tools he needs to do this does not surpass $500.<\/p>\n<p>Researchers Kai Cao and Anil Jain successfully managed to fool the <strong>fingerprint sensors<\/strong> on the\u00a0<strong><a title=\"Samsung Electronics Co.\" href=\"http:\/\/www.samsung.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Samsung<\/a><\/strong> (<a title=\"KS : 005930\" href=\"http:\/\/www.bloomberg.com\/quote\/005930:KS\" target=\"_blank\" rel=\"noopener noreferrer\">005930<\/a>) <a href=\"http:\/\/www.samsung.com\/us\/explore\/galaxy-s-6-features-and-specs\/\" target=\"_blank\" rel=\"noopener noreferrer\">Galaxy S6<\/a> and\u00a0<strong><a title=\"Huawei\" href=\"http:\/\/www.huawei.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Huawei<\/a><\/strong> (<a title=\"SHE:002502\" href=\"http:\/\/www.google.com\/finance?q=SHE%3A002502\" target=\"_blank\" rel=\"noopener noreferrer\">002502<\/a>) <a href=\"http:\/\/www.gsmarena.com\/huawei_honor_7-7269.php\" target=\"_blank\" rel=\"noopener noreferrer\">Hornor 7<\/a> phones.<\/p>\n<p>They posted a demo of the attack on YouTube:<\/p>\n<p><iframe loading=\"lazy\" title=\"Mobile Phone Fingerprint Spoof Attacks\" width=\"480\" height=\"270\" src=\"https:\/\/www.youtube.com\/embed\/fZJI_BrMZXU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p>The attack is an improvement over Germany&#8217;s <a href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-2429814\/Apples-iPhone-5S-fingerprint-scanner-hacked-just-TWO-days.html\" target=\"_blank\" rel=\"noopener noreferrer\">Chaos Computer Club&#8217;s attack<\/a> against <a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) Touch ID on iPhone 5S by lifting a fingerprint of the genuine user of a glass surface and then making a spoof fingerprint. More details about the Michigan State researchers&#8217; work can be found <a href=\"http:\/\/www.cse.msu.edu\/rgroups\/biometrics\/Publications\/Fingerprint\/CaoJain_HackingMobilePhonesUsing2DPrintedFingerprint_MSU-CSE-16-2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>\u00a0(PDF).<\/p>\n<h3>Only a matter of time<\/h3>\n<p><a href=\"https:\/\/community.fico.com\/community\/fico_analytic_cloud\/preventing-fraud\/blog\/2015\/05\/18\/starbucks-app-breach-or-social-engineering-magnet\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105338\" title=\"Starbucks app hacked\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/starbucks-mobile-app-hacked.jpg?resize=143%2C95&#038;ssl=1\" alt=\"Starbucks app hacked\" width=\"143\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/starbucks-mobile-app-hacked.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/starbucks-mobile-app-hacked.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/starbucks-mobile-app-hacked.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 143px) 100vw, 143px\" \/><\/a>The Sparty researchers note that not all mobile phones can be hacked using this method. But their experiment is proof of the urgent need for anti-spoofing techniques for <strong>fingerprint recognition<\/strong> systems, especially for mobile devices which are being increasingly used as a part of <strong>two-factor authentication<\/strong> for site access and payment processing like Apple Pay, <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) Pay, or Samsung Pay.<\/p>\n<p>The researchers warn that it is only a matter of time before hackers develop improved hacking strategies not just for fingerprints, but other biometric traits that are being adopted for mobile phones (e.g., face, iris, and voice).<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers can copy your fingerprint to fool the biometrics on your Samsung Galaxy mobile phone with AgIC ink and a printer.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,420,202,101,2389,1452,2639,1807,536,2644,748,304,431,393,4,2642,1546],"class_list":["post-79813","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-aapl","tag-android","tag-apple","tag-apple-pay","tag-biometrics","tag-fingerprint","tag-galaxy","tag-goog","tag-google-pay","tag-huawei","tag-iphone","tag-mobile","tag-samsung","tag-security","tag-touch-id","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/79813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=79813"}],"version-history":[{"count":10,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/79813\/revisions"}],"predecessor-version":[{"id":126177,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/79813\/revisions\/126177"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=79813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=79813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=79813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}