News

Hackers Can Break Fingerprint Unlocking On Phones Within Hours

A team of cyber security researchers at Tencent Labs and Zhejiang University reveals that a potential method to “brute-force” fingerprints on Android devices.

According to that,if a hacker has physical access of the device and sufficient time, with the new technique they may be able to unlock the device.

MAL And CAMF

As per the reports, the two zeros vulnerabilities named Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL) which not only affect the Android devices but also affects Apple’s iOS and Huwaei’s HarmonyOS.

Though, the researchers were able to accomplish two goals by taking advantage of these weaknesses. First, they enabled an infinite number of fingerprint scanning attempts by getting around Android’s cap on attempts.

Second, they improved their attack startegy by utilising databases derived from academic datasets, biometric data leaks, and other sources.

How Does It Work

In order to carry out these attacks,the attackers needed a few essential components including an Android smartphones in their actual possession, enough time, and hardware that cost around $15.

In addition, the researchers named the attack as “Bruteprint” and claimed that it would take between 2.9 and 13.9 hours to compromise the security of a device with just one fingerprint registered.

On the other hand, devices that have multiple fingerprint records were discovered to be significantly simpler to compromise. With an average time of succesfull “brute-printing” ranging from 0.66 to 2.78 hours.

According to the Research by the team of researchers conducted an experiment on ten “popular smartphone models” including a few iOS devices. Whereas, the vulnerable models were not disclosed. But the researchers reported that they were able to bypass the attempt limit and perform unlimited tries on HarmonyOS and Android devices.

Which Phone Is Safer?

iOS is quite a safer device, as the hackers were only able to gain an additional tem attempts on iPhone SE and iPhone 7 model. Whi h depicts insufficient to successfully carry out the attack.

On the other hand, iOS may have potential vulnerabilities related to these flaws. The current method of brute-force entry is inadequate.

In conclusion, the researchers said that while this sort of attack may be not appealing to typical hackers. But, it could be interested for many people and law enforcement agencies.

Read more:

Voice Chat With ChatGPT On Android Phones: Here’s How

WhatsApp’s Exclusive Feature For iOS Users:Not For The Android Users

 

Sponsored
Senoria Khursheed

Share
Published by
Senoria Khursheed

Recent Posts

Rumors Indicate iPhone 17 May Feature Unconventional Camera Design

Apple is reportedly preparing for a significant design overhaul with its iPhone 17 series, blending…

47 mins ago

First AI-Powered Teacher Launched in Pakistan’s Private School

Karachi: A private school in Karachi has unveiled Pakistan’s first AI-powered teacher, a groundbreaking move…

2 hours ago

Yahoo Surprises Users with Its Latest Android Launcher

Third-party apps have long been a staple of the Android ecosystem, but their appeal has…

3 hours ago

Phase-II Review of PTCL-Telenor Deal Finalized by CCP

ISLAMABAD: The Competition Commission of Pakistan (CCP) has completed its Phase-II review of Pakistan Telecommunication…

3 hours ago

Xiaomi’s SU7 Achieves New Production Record, Driving Q3 Growth

Xiaomi has shattered records by producing 100,000 vehicles in just 230 days. This is nearly…

5 hours ago

Teachers Can Now Access OpenAI’s Free AI Course

OpenAI, in collaboration with nonprofit organization Common Sense Media, announced on Wednesday the launch of…

6 hours ago