Article Image
IPFS News Link • Technology: Software

Here's How HTC and Samsung's Fingerprint Scanner Was Hacked

• http://www.popsci.com

The fingerprint scanner has raised questions since its first integration into the modern smartphone: is it secure, is it reliable, who will have access to my fingerprints?

Besides a number of external ways to fool a scanner, researchers at FireEye, a security company, found an internal vulnerability in phones like the HTC One Max and Samsung Galaxy S5 that left fingerprint images vulnerable to being copied by hackers or malware. The vulnerability has since been fixed on all phones that the researchers found to be affected, although it's unclear how the patch was applied.

Before talking about how ridiculously unsecured the fingerprints were, here are a few things to keep in mind about smartphones. A smartphone is just a tiny computer with no keyboard or mouse. Like any computer, smartphones organize their data into folders. As the user, you have access to some folders (like the folder that holds and displays your applications, or the one that holds pictures) while you don't have access to others. This is meant to prevent accidentally deleting important files. For security, some folders are further only accessible by the phones operating system; regular users and applications can't get inside. Those kinds of folders are usually where phone makers store fingerprint data.

Samsung and HTC weren't doing that. Instead, they were putting them in a folder called /data/, which is a very accessibly folder. If you have an Android phone, you can open a file manager and look into that folder right now. (It might seem empty, but only because the files are hidden to you. That can be changed in most file managers' options page.) The file itself was a common image format (.bmp) and the image only skewed by minimal security. The permission in the phone is actually called "world readable." So, if a malicious app wanted to take the image of your fingerprint, nothing would stop it. And that's it. No attacks to gain root access or phishing. Just going into an unprotected folder.


http://freedomsphoenix.thinkpenguin.com/