Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ Information Security Newspaper|Infosec Articles|Hacking News Wed, 24 May 2023 00:23:37 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.4 https://www.securitynewspaper.com/snews-up/2018/12/news5.png Information Security News|Cyber Security|Hacking Tutorial https://www.securitynewspaper.com/ 32 32 Unlock any Android Smartphone with this fingerprint hack https://www.securitynewspaper.com/2023/05/24/unlock-any-android-smartphone-with-this-fingerprint-hack/ Wed, 24 May 2023 14:08:00 +0000 https://www.securitynewspaper.com/?p=26757 Researchers from Tencent Labs and Zhejiang University have collaborated to develop a new technique known as “BrutePrint,” which enables the forcible extraction of fingerprints from modern smartphones. This technique wasRead More →

The post Unlock any Android Smartphone with this fingerprint hack appeared first on Information Security Newspaper | Hacking News.

]]>
Researchers from Tencent Labs and Zhejiang University have collaborated to develop a new technique known as “BrutePrint,” which enables the forcible extraction of fingerprints from modern smartphones. This technique was recently shown to the public.

This approach sidesteps user authentication, therefore providing unauthorized access and complete control over the device that is the focus of the attack.Researchers from China were able to undertake brute-force attacks and acquire unauthorized access to accounts, systems, and networks by effectively circumventing the current security mechanisms on smartphones, such as attempt limitations and liveness detection, by exploiting two zero-day vulnerabilities. This enabled the researchers to gain unauthorized access to accounts, systems, and networks.The following zero-day vulnerabilities have been exploited, and we have listed them below:

Cancel-After-Match-Fail (CAMF)
Match-After-Lock (MAL)

In addition, researchers found a potential vulnerability in the protection of biometric data that was being communicated by fingerprint sensors via the Serial Peripheral Interface (SPI).In order to analyze the efficacy of BrutePrint and SPI MITM attacks, a thorough test was run on 10 different types of smartphones that are quite popular.

The findings showed that these attacks were effective in allowing an infinite number of tries on any Huawei device running Android or HarmonyOS; however, iOS devices indicated a restricted vulnerability, allowing for just an extra 10 attempts to be made.
The primary idea of BrutePrint is to send an unconstrained series of fingerprint image submissions to the device that is being targeted. This process is repeated until a match is discovered with the user-defined fingerprint, and there are no restrictions placed on the number of times the process may be carried out.

An attacker can launch a BrutePrint attack on a target device by first gaining physical access to the device, then gaining access to a fingerprint database, and finally using equipment that costs around $15. This allows the attacker to manipulate the False Acceptance Rate (FAR) in order to increase the acceptance threshold for fingerprint matches and achieve easier unauthorized access.

By exploiting the CAMF issue, BrutePrint injects a checksum mistake into the fingerprint data. This enables it to circumvent security mechanisms and gives attackers the ability to try an endless number of fingerprint matches on smartphones without being discovered.By exploiting the MAL vulnerability, attackers get the ability to determine the authentication results of the fingerprint photographs they test on the target device, even while the device is in a “lockout mode” state of operation.The BrutePrint attack sidesteps the lockout mode by exploiting a process known as MAL. It also makes use of a method known as “neural style transfer” to change fingerprint pictures in the database so that they more closely match sensor scans taken by the target device. This increases the probability that the authentication will be successful.

The researchers found that every Android and iOS device they tested had a vulnerability to at least one known vulnerability after running a series of tests on those devices. The tests were carried out on a selection of 10 different mobile devices.


The researchers found that certain iPhone models are susceptible to CAMF, but due to the limited number of fingerprint attempts (up to 15), it is impractical to brute-force the owner’s fingerprint. Additionally, the researchers found that all tested Android devices are susceptible to the SPI MITM attack, with the exception of iPhones, which encrypt fingerprint data on the SPI, rendering any interception ineffective.

BrutePrint may appear to have limitations due to the requirement that it must have prolonged access to the device it is targeting; however, its potential for enabling thieves to unlock stolen devices and extract private data, as well as the ethical concerns and privacy rights implications for law enforcement during investigations, raise significant issues regarding rights violations and the safety of individuals in countries with a dominant political or economic position.

The post Unlock any Android Smartphone with this fingerprint hack appeared first on Information Security Newspaper | Hacking News.

]]>
MASQ: The new hacking tool able to copy the identity of any smart device https://www.securitynewspaper.com/2021/06/15/masq-the-new-hacking-tool-able-to-copy-the-identity-of-any-smart-device/ Tue, 15 Jun 2021 21:52:42 +0000 https://www.securitynewspaper.com/?p=23687 A recent security report details the detection of MASQ, a tool that allows threat actors to copy smart devices fingerprints, allowing them to evade any security mechanism for malicious purposes.Read More →

The post MASQ: The new hacking tool able to copy the identity of any smart device appeared first on Information Security Newspaper | Hacking News.

]]>
A recent security report details the detection of MASQ, a tool that allows threat actors to copy smart devices fingerprints, allowing them to evade any security mechanism for malicious purposes. This tool is sold on the dark web and has support for all kinds of devices, including smart TVs from manufacturers such as Samsung, Sony or Philips and for video game consoles such as PlayStation and Xbox.

According to the experts at Resecurity, this is one of the most popular cybercriminal trends today, as it allows hackers to perform account takeover attacks and easily access compromised online accounts without attracting the attention of affected users or security systems on these platforms.

Before continuing, it is necessary to clarify that the term fingerprints refers to a set of data related to the user’s devices, including IP addresses, screen resolution, browser data, time zone, language, navigation cookies and browser plugins installed. Many of the current anti-fraud solutions are based on fingerprint verification and are usually regarded as a reliable method.

Using MASQ in conjunction with the credentials for an attacked account, threat actors can reuse victim cookies to spoof the digital record of an authentic device. Anti-fraud mechanisms will not be able to identify this malicious activity, so transactions will be carried out without raising suspicions.

With the active growth of consumers using mobile devices, cybercriminals use such tactics more often to compromise all kinds of online accounts, including email platforms, social media accounts and online banking accounts.

“These tools represent one of the biggest risks for online transactions, as they enable all kinds of frauds. It is extremely important to track the emergence of such tools on the dark web and use this knowledge to develop more advanced fraud prevention and digital identity authentication controls,” Resecurity experts mention.

The latest version of MASQ was released on June 13, indicating that the tool receives constant updates and maintenance. Experts mention that this tool has already displaced Linken Sphere as the most popular evasion tool today, so it will continue to be in the news for months to come.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post MASQ: The new hacking tool able to copy the identity of any smart device appeared first on Information Security Newspaper | Hacking News.

]]>
POPULAR NEWS VIDEO 8 AUG https://www.securitynewspaper.com/2019/08/08/popular-news-video-8-aug/ Thu, 08 Aug 2019 16:24:17 +0000 https://www.securitynewspaper.com/?p=16459 Hackers can clone your fingerprints if you show ur hands in photos | President of USA and FBI call social media companies to develop tools so they can detect criminalsRead More →

The post POPULAR NEWS VIDEO 8 AUG appeared first on Information Security Newspaper | Hacking News.

]]>

Hackers can clone your fingerprints if you show ur hands in photos | President of USA and FBI call social media companies to develop tools so they can detect criminals before they strike

Below the links to the cybersecurity news.

1. Hackers can clone your fingerprints if you show ur hands in your photos.

2. President of USA and FBI call social media companies to develop tools so they can detect criminals before they strike

The post POPULAR NEWS VIDEO 8 AUG appeared first on Information Security Newspaper | Hacking News.

]]>
How hackers are stealing people’s fingerprints with their photos https://www.securitynewspaper.com/2019/08/06/how-hackers-are-stealing-peoples-fingerprints-with-their-photos/ Tue, 06 Aug 2019 23:13:26 +0000 https://www.securitynewspaper.com/?p=16437 Millions of people take selfies posing in such various ways, like doing the sign of peace hand gesture. This is a very common thing and it has not caused problemsRead More →

The post How hackers are stealing people’s fingerprints with their photos appeared first on Information Security Newspaper | Hacking News.

]]>
Millions of people take selfies posing in such various ways, like doing the sign of peace hand gesture. This is a very common thing and it has not caused problems for anyone, at least not until now, because many cybersecurity specialists claim that with the technological resources available today, such a photo is all that a hacker needs to compromise all a person’s information.

Carlos Gutierrez, an FBI consultant expert, claims that a hacker could copy the fingerprints of anyone using a high-resolution camera.

“Smartphone cameras are increasingly equipped with better resolution; by just zooming in a photo you could see a person’s fingerprints. There have already been reports of cloning fingerprints from photographs,” says the cybersecurity expert. “With access to this information hackers could break into bank accounts, request credits, and unlock mobile devices, among other malicious activities”.

In addition, he notes that the use of fingerprints as a means of authentication could further compromise the user than the traditional username and password method: “Anyone can reset the password of their email or other platforms, but fingerprints are for life,” the expert adds.

It should be noted that this attack variant requires various conditions to be met; to begin with, the camera with which the photograph was taken must have a very high resolution, in addition the fingertips of the person appearing in the photo must be in the appropriate position for the fingerprints to be sufficiently visible.

The good news is that not everything is lost. Teams of experts are developing a protective layer for our hands that would cover our fingerprint, preventing hackers from getting it with just one photo.

Faced with the potential risk of becoming victims of identity fraud, cybersecurity specialists from the International Institute of Cyber Security (IICS) recommend users who like to post their photos constantly applying some modifications, such as cropping the image so that the fingerprint doesn’t appear full sized or applying filters that make it difficult to see the image.

Some hackers have successfully attempted fingerprint cloning before; a few years ago, Jan Krissler forged Apple‘s TouchID sensors when the iPhone 5S was released using only the stain of a fingerprint on the sensor screen. The hacker managed to create a fake finger with that fingerprint and unlocked the device. A year later, the same hacker used some photos posted on Internet pages to falsify the fingerprint of Germany’s defense minister.

The post How hackers are stealing people’s fingerprints with their photos appeared first on Information Security Newspaper | Hacking News.

]]>
Russia Might Be Hacking FBI And Stealing Fingerprints Of Millions, Says Report https://www.securitynewspaper.com/2017/12/28/russia-might-hacking-fbi-stealing-fingerprints-millions-says-report/ Thu, 28 Dec 2017 13:30:03 +0000 https://www.securitynewspaper.com/?p=9704 If a mere speculation is to be believed, the biometric data of millions of Americans could be at the risk of being compromised by Russian hackers. They could “even compromiseRead More →

The post Russia Might Be Hacking FBI And Stealing Fingerprints Of Millions, Says Report appeared first on Information Security Newspaper | Hacking News.

]]>
If a mere speculation is to be believed, the biometric data of millions of Americans could be at the risk of being compromised by Russian hackers. They could “even compromise wider national security and law enforcement computer systems,” says a detailed BuzzFeed report citing some documents and two whistleblowers as the source.

The fingerprints recognition software used by the Federal Bureau of Investigation and around 18,000 US law enforcement agencies include a piece of code made by a Russia-based firm called Papillon AO.

The fingerprint analysis software was purchased from the French company called Morpho (earlier known as Sagem Sécurité) which “deliberately concealed” the existence of the secretly sourced Russian code, the report claims.

However, the reason why it was kept a secret is due to a non-disclosure agreement between Morpho and Papillion that happened almost 10 years ago when the code was sold for $6 million. Morpho is now owned by a US firm and its name has been changed to Idemia.

Maybe, a backdoor in the fingerprint recognition software is just a possibility. Becuase none of the sources and cybersecurity experts the website contacted have claimed the existence of the same in the code.

But what could raise eyebrows is that Papillion, in the past, has openly talked about their collaborations with Kremlin-fueled bodies including the Ministry of Defence and Federal Security Service, also known as FSB.

Papillion has denied the allegations of any backdoor in the code. The FBI didn’t address the website’s request for a comment on the matter but said that the all the software are well-checked and reviewed before they’re deployed.

Source:https://fossbytes.com/russia-hacking-fbi-stealing-fingerprints/

The post Russia Might Be Hacking FBI And Stealing Fingerprints Of Millions, Says Report appeared first on Information Security Newspaper | Hacking News.

]]>
Virulent WCry ransomware worm may have North Korea’s fingerprints on it https://www.securitynewspaper.com/2017/05/16/virulent-wcry-ransomware-worm-may-north-koreas-fingerprints/ Tue, 16 May 2017 02:31:16 +0000 https://www.securitynewspaper.com/?p=8233 Identical code ties Friday’s attacks to hacks on Sony Pictures and $1bn bank heist. A researcher has found digital fingerprints that tie the WCry ransomware worm that menaced the worldRead More →

The post Virulent WCry ransomware worm may have North Korea’s fingerprints on it appeared first on Information Security Newspaper | Hacking News.

]]>
Identical code ties Friday’s attacks to hacks on Sony Pictures and $1bn bank heist.

A researcher has found digital fingerprints that tie the WCry ransomware worm that menaced the world on Friday to a prolific hacking operation that previously generated headlines by attacking Sony Pictures, the Bangladesh Central Bank, and South Korean banks.

The link came in a cryptic Twitter message from Neel Mehta, a security researcher at Google. The tweet referenced identical code found in a WCry sample from February and an early 2015 version of Cantopee, a malicious backdoor used by Lazarus Group, a hacking team that has been operating since at least 2011. Previously discovered code fingerprints already tied Lazarus Group to the highly destructive hack that caused hard drives in South Korea to self-destruct in 2013, wiped almost a terabyte’s worth of data from Sony Pictures in 2014, and siphoned almost $1 billion from the Bangladesh Central Bank last year by compromising the SWIFT network used to transfer funds.

Red highlights show identical code shared between a February version of WCry and a 2015 backdoor used by Lazarus Group.

Over a matter of hours on Friday, Wcry used leaked National Security Agency-developed code to attack an estimated 200,000 computers in 150 countries. Also known as WannaCry, the self-replicating malware encrypted hard drives until victims paid ransoms ranging from $300 to $600. Infected hospitals soon responded by turning away patients and rerouting ambulances. Businesses and government agencies all over the world quickly disconnected computers from the Internet, either because they were no longer working or to prevent them from being hit. The outbreak was largely contained because the attackers failed to secure a domain name hard-coded into their exploit.

The missing link

The haystack needle Mehta presented Monday now connects Lazarus to WCry, although the tie connecting the two isn’t precisely clear just yet. WCry’s creators may have deliberately added code found in Cantopee in an attempt to trick researchers into mistakenly believing Lazarus Group is behind the ransomware. Researchers at antivirus provider Kaspersky Lab said such a “false flag” is plausible but improbable. The Cantopee code snippet, the researchers explained, was removed from later versions of WCry, making it hard to spot and hence ill-suited to act as a decoy.

“For now, more research is required into older version of WannaCry,” the Kaspersky Lab researchers wrote in a blog post headlined “WannaCry and Lazarus Group—the missing link.” “We believe this might hold the key to solve some of the mysteries around this attack. One thing is for sure—Neel Mehta’s discovery is the most significant clue to date regarding the origins of WannaCry.”

Little is known about Lazarus Group. It first came to light in a report published in February by security firm Novetta. Kaspersky Lab has authored reports here and here that further document the group, including its ties to North Korea. In early 2015, the Obama administration took the unusual step of sanctioning North Korea after saying US intelligence sources were confident the rogue nation was responsible for the Sony hack.

Other researchers agreed that the shared code between WCry and Cantopee was important.

“This opens a lot of possibilities for everyone to find other similarities between all versions of WannaCrypt that have been found so far, and the tools used by Lazarus,” Maarten van Dantzig, a researcher at FOX-IT, told Ars.

A tie to North Korea might explain some of the unusual behavior researchers have observed in last Friday’s outbreak. The malware came with a mechanism hard-coded into it that allowed the attackers to shut down the self-replicating chain of attacks. Such “killswitches” are highly unusual for malware developed by financially motivated criminal groups. By contrast, they’re much more common in malware written by nation-sponsored hackers.

“Malware authors rarely wonder ‘What if this totally gets out of hand?'” Martijn Grooten, a security researcher for Virus Bulletin, told Ars. “Killswitches in malware are rare, and I can only think of government malware with those built in. Governments care about collateral damage far more than criminals do. And North Korea has recently been active as the Lazarus group.”

Grooten went on to say, “BTW, ‘North Korea’ may well be a foreign hacker group paid by them.”

A North Korean origin might also explain why the malware was fraught with other unusual behavior, including the failure to secure the domain name that triggers the killswitch. Another oddity, as reported by Wired, was WCry’s failure to automatically verify when victims have paid a Bitcoin ransom. If an enemy nation is behind the attack, the motivation may be to sow disruption and anxiety or to embarrass the NSA, rather than to make financial gains.

Readers should know that the usual caveats apply about hacking attribution being fraught with potential errors. A vocal group of critics have long cast doubt on North Korea being behind the Sony attacks. Virtually all of the evidence made public so far is extremely circumstantial. But as Kaspersky and van Dantzig say, the connection disclosed Monday is potentially significant enough to warrant a major worldwide investigation that almost certainly started within minutes of Mehta issuing his tweet.

 Source:https://arstechnica.com/security/2017/05/virulent-wcry-ransomware-worm-may-have-north-koreas-fingerprints-on-it/

The post Virulent WCry ransomware worm may have North Korea’s fingerprints on it appeared first on Information Security Newspaper | Hacking News.

]]>
3D printing of a dead man’s fingers allows unlocking his phone https://www.securitynewspaper.com/2016/07/22/3d-printing-dead-mans-fingers-allows-unlocking-phone/ Fri, 22 Jul 2016 08:53:27 +0000 https://www.securitynewspaper.com/?p=5256 The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work? Do you remember the battle Apple vsRead More →

The post 3D printing of a dead man’s fingers allows unlocking his phone appeared first on Information Security Newspaper | Hacking News.

]]>

The US federal authorities asked a 3D printing lab to recreate a dead man’s fingers to unlock his smartphone … will it work?

Do you remember the battle Apple vs FBI conducted to force the IT giant on unlocking the San Bernardino Shooter’s iPhone, well it has become a story of the past.

The federal authorities are working on a new technique for unlocking phones using any biometric sensor.

The Police in Michigan is evaluating the possibility to reproduce a dead man’s fingerprint from a prerecorded scan. with 3D printing and use it to unlock any mobile device.

According to Rose Eveleth, the Police asked a 3D printing lab at the University of Michigan to recreate a dead man’s fingers to unlock his phone.

In this specific case, the man was killed and investigators believed that his mobile device contains useful information to solve the case.

3D printing hacking Apple TouchID

Contrary to what you think, it isn’t so easy to reproduce such kind of  fingers because modern biometric sensors rely on electrical currents that most 3D-printed objects are not able to conduct.

For this reason, the federal authorities requested the help of the professor Anil Jain at the University of Michigan. The professor “coated the 3D printed fingers in a thin layer of metallic particles” in order to overwhelm the limitation related to the electric conduction of that most 3D-printed objects.

“The police already have a scan of the victim’s fingerprints taken while he was alive (apparently he had been arrested previously). They gave those scans to the lab, and using them Arora has created 3D printed replicas of all ten digits.” stated the report published by Eveleth. “A 3D printed finger alone often can’t unlock a phone these days. Most fingerprint readers used on phones are capacitive, which means they rely on the closing of tiny electrical circuits to work. The ridges of your fingers cause some of these circuits to come in contact with each other, generating an image of the fingerprint. Skin is conductive enough to close these circuits, but the normal 3D printing plastic isn’t, so Arora coated the 3D printed fingers in a thin layer of metallic particles so that the fingerprint scanner can read them.”

Arora and his team haven’t yet tested the fingers on the mobile device of the dead man, but the professor is confident that in a few weeks he will be able to unlock the device .

On the other hand, this technique potentially represents a threat to the users’ privacy, there is the concrete risk that someone could abuse it, for example by stealing a fingerprint using a high-resolution photo and recreating it with a 3D-printing process.

At the time I was writing the investigation is still ongoing and there are no details on the research.

If the experiment will be successful, the unique defense for the users will be to disable the biometric sensor on the mobile smartphone. Fortunately many modern smartphones require a passcode if the owner hasn’t used the fingerprint unlock in over 48 hours.

Source:https://securityaffairs.co/

The post 3D printing of a dead man’s fingers allows unlocking his phone appeared first on Information Security Newspaper | Hacking News.

]]>
Fingerprints of over 5.6 Million Americans Stolen During the OPM Hack https://www.securitynewspaper.com/2015/09/24/fingerprints-of-over-5-6-million-americans-stolen-during-the-opm-hack/ Thu, 24 Sep 2015 07:10:32 +0000 https://www.securitynewspaper.com/?p=554 The data breach at the US Office of Personnel Management (OPM) is slowly shaping up to be one of the biggest hacks in the country’s history, the Department of DefenseRead More →

The post Fingerprints of over 5.6 Million Americans Stolen During the OPM Hack appeared first on Information Security Newspaper | Hacking News.

]]>
The data breach at the US Office of Personnel Management (OPM) is slowly shaping up to be one of the biggest hacks in the country’s history, the Department of Defense (DoD) revealing that, besides the personal information of over 21 million American government officials, the hackers might have gotten their hands on fingerprint records for over 5.6 million employees.

While initial reports placed the OPM hack at around 1.1 million affected people, as time went by, the number grew to 4 million, then 18 million, before finally ballooning at 21 million in the most recent official statement.

Fingerprints of over 5.6 Million Americans Stolen During the OPM Hack

Now, as the OPM internal security team is investigating the incident alongside the DoD, new information has come to light, according to which, some of the servers on which the hackers found their way into also contained biometrics data, fingerprints, to be more exact.

FBI officials say that, while this data is quite harmless at the moment, it could still be used in upcoming years, as fingerprints will slowly start to replace passwords.

One of the companies pioneering this trend is Apple, which included its Touch ID system in its latest iOS 9 release.

Besides phones and tablets, the technology is also expected to be used with online banking services, providing a much safer and quicker way to authenticate, eliminating many of the current entry points for hackers, which most of the times are targeting the user’s alpha-numeric passwords.

This is just an update on the OPM hack, and we’ll be following it to bring you more details as the investigators churn through the data.

Source:https://news.softpedia.com/

The post Fingerprints of over 5.6 Million Americans Stolen During the OPM Hack appeared first on Information Security Newspaper | Hacking News.

]]>