TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
  • FAQ
    • Articles
No Result
View All Result
 Hot Topics:
  • Social media chroming challenge
  • Snapchat planets order
  • Replika AI
  • Best D4 guides
  • Binance WOTD answers (Scam Prevention)
TechBriefly
No Result
View All Result
Home Tech Security

Android Phones: Vulnerability to Fingerprint Brute-Force Attacks

Unveiling the Vulnerability: Android Phones and the Threat of Fingerprint Brute-Force Attacks

by Merasturda Enkeste
23 May 2023
in Security, Smartphones
Reading Time: 2 mins read
Android phone vulnerable to fingerprint brute-force attacks

Android phone vulnerable to fingerprint brute-force attacks

Share on FacebookShare on Twitter

In this blog post, we will delve into the vulnerability of Android phones to fingerprint brute-force attacks. The original source of the news broadcasted on Bleeping Computer.

Understanding Fingerprint Brute-Force Attacks

Fingerprint brute-force attacks rely on repetitive attempts to crack the fingerprint authentication system on smartphones, aiming to gain unauthorized access and control over the device. These attacks exploit vulnerabilities in the security measures implemented on certain Android devices.

Exploiting Zero-Day Vulnerabilities

Researchers at Tencent Labs and Zhejiang University recently uncovered a new attack method known as ‘BrutePrint.’ By exploiting two zero-day vulnerabilities, Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), the researchers were able to bypass existing safeguards that protect against brute-force attacks on modern smartphones.

How BrutePrint Works

BrutePrint involves an attacker submitting an unlimited number of fingerprint images to the targeted device until a match is found with a user-defined fingerprint. Physical access to the device is necessary to launch this attack, along with access to a fingerprint database, which can be obtained from academic datasets or biometric data leaks. The cost of the required equipment is approximately $15.

 Android phone vulnerable to fingerprint brute-force attacks
Android phone vulnerable to fingerprint brute-force attacks

Manipulating Authentication Mechanisms

Unlike password cracking, fingerprint authentication relies on a reference threshold instead of a specific value. Attackers can manipulate the False Acceptance Rate (FAR) to increase the acceptance threshold and facilitate easier matches. BrutePrint manipulates the multi-sampling and error-canceling mechanisms of fingerprint authentication on smartphones by exploiting the CAMF vulnerability.

Overcoming Lockout Modes

The MAL flaw allows attackers to deduce authentication results of fingerprint images, even when the device is in “lockout mode.” Lockout mode is activated after a certain number of consecutive failed unlock attempts. However, the MAL vulnerability helps bypass this restriction, enabling the attackers to continue their brute-force attempts.

The Impact and Mitigation

The BrutePrint attack was tested against ten popular smartphone models, revealing that all Android and HarmonyOS (Huawei) devices were vulnerable to unlimited attempts, while iOS devices allowed for ten additional attempts. This vulnerability highlights the need for stronger security measures on Android devices to protect against fingerprint brute-force attacks.

 Android phone vulnerable to fingerprint brute-force attacks
Android phone vulnerable to fingerprint brute-force attacks

Safeguarding Your Device: Protecting Against Fingerprint Brute-Force Attacks

Vulnerability of Android phones to fingerprint brute-force attacks raises concerns regarding user privacy and device security. It is crucial for device manufacturers and software developers to address these vulnerabilities by implementing robust security measures and regular software updates.

By understanding the potential risks associated with fingerprint authentication and staying vigilant about device security, users can mitigate the impact of such attacks and safeguard their personal information.

In the past months, we have also prepared an article about a Nexus Android Trojan infiltrating crypto wallets regarding the security problems of Smartphones, I suggest you check it out as well.

Tags: Android VulnerabilityBrute-Force AttacksFingerprint Authentication

Related Posts

Operation Triangulation

Operation Triangulation exposed: The global cybersecurity challenge

irecorder

If you used this app you may have been spied

QBot Malware

QBot Malware exploits WordPad’s DLL loading mechanism

Motorola Edge Plus 2023

Motorola Edge Plus 2023: Specs, release date and more

POPULAR

Binance Word of the Day answers: Crypto Portfolios theme

Binance Word of the Day answers: Scam Prevention theme

Twitter translation not working: How to fix it?

What does setting interrogation succeeded mean?

RCM Loader for Nintendo Switch: What is it, how can you install?

Is there a way to remove Character AI NSFW filters?

Can Chai see your chats?

What is Instagram direct message suggested list order (explained)?

What is Snapchat planets order?

How to play Minecraft Jenny mod?

RSS News Republic

  • Black Clover season 5 release date, story, and more
  • 7 best NSFW AI art generators
  • A joke goes viral: How long do idiots live?
  • Elon Musk’s actual height revealed: How tall is he?
  • Hogwarts Legacy: Which ball in Quidditch is the largest?

RSS Digital Report

  • Using Voice of the Customer for marketing and its benefits
  • Creating estimations for cost and organic traffic for your future SEO endeavors
  • Biggest issues plaguing the blockchain in 2023
  • What is the “Framing Effect” in marketing and how to use it?
  • How does in-house SEO compare to utilizing agencies and how to get started with it?

RSS Latest from LeaderGamer

  • Diablo 4 servers crashed – How to check server status?
  • Diablo 4 315306 bug fix
  • How to do Diablo 4 Donan’s Favor quest?
  • Diablo 4 Act number – How many chapters are in the game?
  • League of Slots Game Collection Review
TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • FAQ
  • | Network Sites |
  • Digital Report
  • LeaderGamer
  • News Republic

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
  • FAQ
    • Articles