AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

BrutePrint: the impact of mobile phone fingerprint vulnerabilities

A novel, low-cost attack technique bypasses biometric safeguards, leveraging undisclosed vulnerabilities in the mobile fingerprint authentication system

This pill is also available in Italian language

In recent scientific advancements, an economical method, termed "BrutePrint", has been identified that can exploit fingerprints on mobile phones for unauthorized access and eventual control of the devices. This innovative strategy surpasses the preventative barriers designed to inhibit recurrent unsuccessful attempts of biometric verification by employing two undisclosed vulnerabilities in the structure of mobile phone fingerprint verification.

These susceptibilities, namely Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), exploit logical errors within the verification framework, brought about by inadequate security of fingerprint data on the Serial Peripheral Interface (SPI) of fingerprint detectors. Consequently, this facilitates a "hardware-based opportunity to launch man-in-the-middle (MitM) attacks for fingerprint image hijacking", as described by researchers Yu Chen and Yiling He in their investigative report. BrutePrint essentially functions as an intermediary between the fingerprint detector and the Trusted Execution Environment (TEE).

Fundamentally, the intention is to achieve limitless submission of fingerprint images until a match is identified. Nonetheless, this strategy assumes the malicious actor already possesses the device intended for attack. It also necessitates the antagonist to hold a fingerprint repository, and an assembly consisting of a microcontroller board and an auto-clicker that can seize data transmitted by a fingerprint detector, enabling the execution of the attack for as meager as $15.

CAMF, one of the two susceptibilities making this attack feasible, augments the system's fault tolerance capabilities by invalidating the fingerprint data's checksum, thereby granting the attacker infinite attempts. In contrast, MAL manipulates a side channel to infer matches of the fingerprint images on the targeted devices, even when the device enters lockout mode following numerous consecutive login attempts.

Despite a further check in Keyguard to inhibit unlocking during lockout mode, the verification result is determined by TEE, as clarified by the researchers. Therefore, the immediate return of a successful verification result when a matched sample is identified enables side-channel attacks to infer the result from features like response time and the quantity of obtained images.

BrutePrint was tested against ten varied smartphone models, including those from Apple, Huawei, OnePlus, OPPO, Samsung, Xiaomi, and Vivo, resulting in limitless attempts on Android and HarmonyOS, and an additional ten attempts on iOS devices.

This study's revelation aligns with the disclosure by a team of scholars regarding a hybrid side-channel that manipulates the "balance between execution speed (i.e., frequency), power consumption, and temperature" in contemporary system-on-chips (SoCs) and GPUs to initiate "browser-based pixel theft and history sniffing attacks" against Chrome 108 and Safari 16.2.

Another attack named "Hot Pixels", leverages this characteristic to launch website fingerprinting attacks and employ JavaScript code to gather a user's browsing history. This is achieved by crafting a computationally intense SVG filter to leak pixel colors by measuring rendering times and covertly collect the information with an accuracy of up to 94%.

Apple, Google, AMD, Intel, Nvidia, Qualcomm have recognized these issues. The researchers also advise "restricting SVG filters from being applied to iframes or hyperlinks" and blocking unprivileged access to sensor readings.

Additionally, BrutePrint and Hot Pixels accompany Google's detection of 10 security flaws in Intel's Trust Domain Extensions (TDX) that could result in arbitrary code execution, denial-of-service conditions, and a compromise of integrity. In a related development, Intel CPUs have also been identified as vulnerable to a side-channel attack that utilizes variations in execution time triggered by altering the EFLAGS register during transient execution to decode data without reliance on the cache.

Follow us on Facebook for more pills like this

05/29/2023 16:29

Editorial AI

Last pills

Serious vulnerability discovered in Rabbit R1: all user data at riskVulnerability in Rabbit R1 exposes sensitive API keys. What are the privacy risks?

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat