How secure is Samsung S5 Finger scanner?
It is now believed that hackers can take copies of fingerprints used to unlock the Samsung Galaxy S5 phone, claim security researchers.
There is a flaw in the Android operating system that makes it possible to steal the personal information. It can then be used elsewhere, said the experts from security firm FireEye. The security company based in the USA have said that other Android-based phones that also use the fingerprint ID systems could also be vulnerable.
Samsung has responded by stating that they took security "very seriously" and was currently investigating the researchers' findings.
Stolen prints
Fingerprint ID systems are becoming a popular alternative to the pin lock, pattern unlock and not forgetting the not so popular face unlock methods. More and more smartphone manufactures are using the fingerprint system on new releases for 2015. PayPal and Apple already accept fingerprints as an ID check and a growing roster of firms that are members of the Fido Alliance are keen to use them in the same way to remove the need for passwords.
Android phones typically store sensitive data such as fingerprint information in a walled-off area of memory known as the Trusted Zone.
However, Yulong Zhang and Tao Wei found it was possible to grab identification data before it is locked away in the secure area. This method of stealing data was available on all phones running version 5.0 or older versions of Android provided the attacker got high level access to a phone.
They also found that on Samsung Galaxy S5 phones, attackers did not need this deep access to a phone. Instead, they said, just getting access to the gadget's memory could reveal finger scan data.
Using this information an attacker could make a fake lock screen that makes victims believe they are swiping to unlock a phone when they are actually authorising a payment.
In addition, they found, it was possible for attackers to upload their own fingerprints as devices did not keep good records of how many prints were being used on each device.
Mr Zhang and Mr Wei are due to present their findings at the RSA security conference in San Francisco on 24 April.
In an interview with Forbes magazine, Mr Zhang said the flaws they uncovered were likely to be widespread throughout handsets running Android 5.0 and below. Updating to the latest version of Android, version 5.1.1, should remove the vulnerabilities, he said.
The flaw is the latest in a series of problems uncovered with fingerprint ID systems on phones.
In April last year, hackers discovered a way to fool the print sensor on the S5 by taking a photograph of a print left on a smartphone screen, making a mould from the image and using that to make a replica fake finger.
In 2013, a German hacker group used a similar method to bypass the fingerprint reader on Apple's iPhone 5s. Hackers from the Chaos Computer Club used a picture of a person's fingerprint left on a glass surface to make a fake finger that unlocked the phone.
Post a Comment