22 May 2023

BrutePrint: A new technique to bypass phone fingerprint authentication


BrutePrint: A new technique to bypass phone fingerprint authentication

A group of Chinese academics have devised a new attack method they dubbed “BrutePrint” that can bypass user authentication on modern smartphones by brute-forcing fingerprints.

The BrutePrint attack involves the exploitation of two security weaknesses called Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), which allows to bypass existing security measures.

The researchers found that biometric data stored on fingerprint sensors’ Serial Peripheral Interface (SPI) is susceptible to Man-in-the-Middle (MITM) attacks due to the lack of proper protection, thus enabling threat actors to intercept and hijack fingerprints images.

The technique requires the attacker to have physical access to the target device, access to a fingerprint database, and equipment costing around $15.

According to the researchers, it only takes between 2.9 and 13.9 hours to break a fingerprint using BrutePrint. A series of experiments involving ten Android and iOS devices showed that Android devices were susceptible to unlimited fingerprint attempts, while iOS devices resisted the brute-forcing attacks, as iPhones encrypt fingerprints in SPI.


Back to the list

Latest Posts

Cyber Security Week in Review: August 30, 2024

Cyber Security Week in Review: August 30, 2024

Google addresses yet another Chrome zero-day, Russian hackers caught using commercial spyware to compromise victims, and more.
30 August 2024
US offers $2.5M reward for information on hacker linked to Angler exploit kit

US offers $2.5M reward for information on hacker linked to Angler exploit kit

Volodymyr Kadariya is believed to be a key player in a major international hacking operation.
29 August 2024
South Korean cyber espionage group exploits zero-day in WPS Office to install SpyGlace backdoor

South Korean cyber espionage group exploits zero-day in WPS Office to install SpyGlace backdoor

The vulnerability, tracked as CVE-2024-7262, has been exploited since at least February 2024.
29 August 2024