Exploit released for Microsoft Exchange RCE bug, patch now
GoDaddy hack causes data breach affecting 1.2 million customers
New Windows zero-day with public exploit lets you become an admin
Biometric auth bypassed using fingerprint photo, printer, and glue
Windows 11 KB5007262 Cumulative Update Preview Released
New Windows zero-day with public exploit lets you become an admin
Exploit released for Microsoft Exchange RCE bug, patch now
UK govt warns thousands of SMBs their online stores were hacked
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
Researchers demonstrated that fingerprints could be cloned for biometric authentication for as little as $5 without using any sophisticated or uncommon tools.
Although fingerprint-based biometric authentication is generally considered superior to PINs and passwords in terms of security, the fact that imprints can be left in numerous public places makes it ripe for abuse.
It has been previously proven that there are ways to collect and use people’s fingerprints to fool even the most sophisticated sensors. However, these typically involve using niche tools such as DSLR cameras and high-fidelity 3D printers.
If only there was a cheap way to retrieve these imprints and convert them to usable fingerprints, it would severely and negatively impact the security of this particular authentication method.
According to the Kraken Security Labs team, there is a way to clone fingerprints using inexpensive materials, with no high-end tools involved in any step of the process.
As the team demonstrated, stealing the fingerprint is a case of photographing it with any modern smartphone and then generating the negative on a photo manipulation software.
This basic editing step is enough to adequately tone the outlines of the stolen fingerprint and prepare it for the printing step, so no high-res DSLR images are required.
For the printing step, any laser printer accepting acetate sheets would be suitable for the attack. Acetate is typically used for cards, stencils, and overlays, but it’s ideal in this case because the laser printer can etch it.
Once the printing is over, the synthetic fingerprint can come together by applying some wood glue on top of the print and letting it dry.
Through testing, the Kraken team found that the resulting fingerprint can fool state-of-the-art fingerprint sensors such as the one used in the latest MacBook Pro.
“We were able to perform this well-known attack on the majority of devices our team had available for testing. Had this been a real attack, we would have had access to a vast range of sensitive information.” – Kraken
Kraken’s findings don’t mean that the end of fingerprints is near, but it’s a good reminder of why people shouldn’t treat them as a single layer of protection for their accounts.
Fingerprints are a convenient biometric authentication method, but when it comes to critical applications, they should only be used as 2FAs in conjunction with a strong password.
“A fingerprint should not be considered a secure alternative to a strong password. Doing so leaves your information — and, potentially, your cryptoassets — vulnerable to even the most unsophisticated of attackers,” explain the Kraken researchers.
As technology progresses and low-cost consumer electronics become more capable of producing high fidelity results, fingerprints will be even easier to clone.
New Gummy Browsers attack lets hackers spoof tracking profiles
Microsoft adds AI-driven ransomware protection to Defender
Hackers undetected on Queensland water supplier server for 9 months
Researchers show that Apple’s CSAM scanning can be fooled easily
Tor Browser 11 removes V2 Onion URL support, adds new UI
Not a member yet? Register Now
Microsoft Exchange servers hacked in internal reply-chain attacks
How to download a Windows 10 21H2 ISO from Microsoft
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.