{"id":32037,"date":"2020-12-24T16:17:47","date_gmt":"2020-12-24T10:47:47","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=32037"},"modified":"2024-03-19T11:51:31","modified_gmt":"2024-03-19T06:21:31","slug":"how-hackers-are-using-malware-to-steal-fingerprints-and-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/how-hackers-are-using-malware-to-steal-fingerprints-and-sensitive-data\/","title":{"rendered":"How Hackers are Using Malware to Steal Fingerprints and Sensitive Data"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">From the past couple of years, the usage and complexity of malware have become slightly inclined, somewhere technology specialists and investigators have managed to remain ahead. So far that&#8217;s all.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2014\/may\/06\/antivirus-software-fails-catch-attacks-security-expert-symantec\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Symantec&#8217;s experts<\/span><\/a><span style=\"font-weight: 400;\">, in the next two years, the improvements in malware development will greatly outweigh the previous changes, painting a boring picture when you remember how much longer it takes to release operating systems and browsers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Are the technologies and advancements behind malware evolving that rapidly? Are the security solutions reliable enough that it can fight against malware?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The answer to this is, no one really knows.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Presently, as you investigate any of the current developments in the field of computer systems, the situation appears intimidating, such that malware can very well hit a point when cyber protection no longer holds up. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Malware is incredibly competitive. Every <\/span><a href=\"https:\/\/dzone.com\/articles\/malware-painting-a-picture\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">malware is battling<\/span><\/a><span style=\"font-weight: 400;\"> to infect the greatest percentage of the Internet with malware writers fighting each other.<\/span><\/p>\n<h2><b>How Hackers Steal Fingerprints<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There obviously exists numerous methods to steal fingerprints. In this blog, we will discuss only the three most used methods used by hackers to demolish customer\u2019s identities and steal sensitive data associated with fingerprints.\u00a0<\/span><\/p>\n<h3>Method #1: Mold the Targeted Fingerprint<\/h3>\n<p><span style=\"font-weight: 400;\">A molded fingerprint may be taken while the victim is, say, oblivious or unconscious. Reasonable material is any soft setting; e.g. clay modeling.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An intruder will then use the mold in order to create a fake fingertip. The apparent challenge is that the assailant has to be physically available and in an acceptable state.<\/span><\/p>\n<h3>Method #2: Get Hold of the Fingerprint Taken With a Scanner<\/h3>\n<p><span style=\"font-weight: 400;\">Another way is to catch a scanner&#8217;s fingerprint. This approach is more complex scientifically, but the positive news for minor fraud is that it is not stored confidently by all organizations that maintain biometric data. So online scanned fingerprints can&#8217;t be identified or bought on the darknet cheaply.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The flat picture would then become a 3D model to be printed on a <a href=\"https:\/\/www.the-next-tech.com\/gadgets\/4-features-to-look-for-when-buying-a-3d-printer\/\">3D printer<\/a>. Firstly, they were not able to identify their dimension in the software in which the researchers produced the drawing. Second, it was important to heat the photopolymer used in the budget 3D printer after printing, which changed model size.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thirdly, if researchers were eventually able to create a viable model, the polymer from which they were produced turned out to be too rough, not fooling a single scanner. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The researchers choose to print a cast, instead of a finger model and then make a prosthetic finger from a more elastic fiber.<\/span><\/p>\n<h3>Method #3: Capturing the Photo of the Fingerprint on a Glass Surface<\/h3>\n<p><span style=\"font-weight: 400;\">The other and the easiest way to steal a fingerprint to take a photo of the desired fingerprint on a glass surface. This is exactly what happened with the iPhone 6 fingerprint scanner. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The image is processed to achieve the requisite transparency and then goes to a 3D printer, as before.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The experiments with 3D printing were long and boring, as the researchers pointed out. The printing system was calibrated and the right size mold was found by test and error, with a total print time of 50 per model. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore it is not possible to easily do a false fingerprint to unlock a stolen Smartphone, nor is it a super quick way to copy the fingerprint of a sleeping victim.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Half the fight is to make a mold to the fingerprint. Material selection for the model itself was even more difficult since the fake was checked on three sensor forms, each using a separate fingerprint reading system. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, it is meaningless for ultrasonic and optical sensors, but not the capacitive kind, whether a substance will conduct current.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, this aspect of the method can be obtained by anyone: inexpensive fabric glue is the perfect material for imitation printing.<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/review\/how-to-fix-tv-grey-screen-issue\/\">How To Fix TV Grey Screen Issue? 2024 Guide<\/a><\/span>\n<h2>Which Devices Were Unlocked Using Fake Fingerprints<\/h2>\n<p><span style=\"font-weight: 400;\">The researchers tested their fake samples on a number of smartphones, tablets, and laptops from different manufacturers, as well as on a smart lock and two USB drives <\/span><a href=\"https:\/\/shuftipro.com\/blog\/post-covid-19-what-are-the-alternatives-to-fingerprint-biometrics-for-identity-verification\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">protected with a fingerprint sensor<\/span><\/a><span style=\"font-weight: 400;\">: the Verbatim Fingerprint Secure and the Lexar Jumpdrive Fingerprint F35. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the least successful end of the spectrum, the 3D-printed molds were not quite different; in fact, all three approaches mentioned above perform well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Exceptions have been developed. In fact, the <\/span><a href=\"https:\/\/www.gizchina.com\/2020\/04\/10\/fingerprint-recognition-is-not-secure-80-of-smartphones-can-unlock-with-fake-fingerprints\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Samsung A70 smartphone <\/span><\/a><span style=\"font-weight: 400;\">could not be split by the testing team \u2014 even though it is worth remembering that the A70 is still most likely to not know its real user.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike the manufacturer, computers running Windows 10 were also <\/span><span style=\"font-weight: 400;\">non permeable<\/span><span style=\"font-weight: 400;\">. This extraordinary stability is due by the researchers to the fact that the operating system itself fits the fingerprint not much of the software maker.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the meantime, the safe flash drives proved deserving of the tag, even though our colleagues caution them that they too can be more advanced.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And then, ultrasound fingerprint scanners were the simplest thing to deceive. They read false prints as authentic beyond their ability to interpret a 3D image by pushing a real finger on the sensor.<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/entertainment\/dnd-character-sheet\/\">DND Character Sheet: What It Is, How To Set Up, Backgrounds & Gameplay Terminology<\/a><\/span>\n<h2>How Secure Are Your Fingerprint Sensors<\/h2>\n<p><span style=\"font-weight: 400;\">The head of the team of X-Lab Chen Yu requested that random people touch a bottle. The left fingerprints were then taken with a smartphone and transferred into an app created by hackers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The software is expected to extract the data needed to clone a fingerprint using a <a href=\"https:\/\/www.the-next-tech.com\/business\/how-to-invest-in-3d-printer-and-earn-money-the-expert-guide\/\">3D Printer<\/a>, but the exact technique has not been seen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It was not shown to the audience for security reasons the physical aspect of the cloning, but the fingerprints produced by the operation were used in order to release three separate smartphones recorded for the audience. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The three most important innovations used in the mobile phone industry are the three separate fingerprint scanning technologies: capacitive, optical, and echo. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The three of them were defeated and it took just 20 minutes to take pictures of the fingerprint and decrypt this unit.<\/span><br \/>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/business\/top-3-lessons-i-learned-from-growing-a-100k-business\/\">Top 3 Lessons I Learned from Growing a $100K+ Business<\/a><\/span>\n<h2>Beware of Uncertain<\/h2>\n<p><span style=\"font-weight: 400;\">While the future of malware is unclear, the risks are certainly present and increasingly popular. There exist many other biometric authentication services such as facial recognition which are much better and <\/span><span style=\"font-weight: 400;\">secure as compared to fingerprints <\/span><span style=\"font-weight: 400;\">that businesses need to adapt to prevent fraud.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the good news is that much of our attempts to defend ourselves can benefit to a certain extent. Firewalls, anti-virus, and anti-spyware programs, identity theft solutions are all excellent ways to keep us from these new malware deployments but will this be enough?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the past couple of years, the usage and complexity of malware have become slightly inclined, somewhere technology specialists and<\/p>\n","protected":false},"author":1964,"featured_media":32038,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[901,3194,209,3265],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/32037"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/1964"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=32037"}],"version-history":[{"count":6,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/32037\/revisions"}],"predecessor-version":[{"id":77830,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/32037\/revisions\/77830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/32038"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=32037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=32037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=32037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}