{"id":30231,"date":"2023-05-23T02:53:24","date_gmt":"2023-05-23T02:53:24","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=30231"},"modified":"2023-05-26T18:15:27","modified_gmt":"2023-05-26T18:15:27","slug":"bruteprint-fingerprint-authentication-attack","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/","title":{"rendered":"A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication"},"content":{"rendered":"\n<p>Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication.<\/p>\n\n\n\n<p>Yiling He of China&#8217;s Zhejiang University and Yu Chen of Tencent Security&#8217;s Xuanwu Lab are calling the attack <a href=\"https:\/\/arxiv.org\/abs\/2305.10791\" target=\"_blank\" rel=\"noreferrer noopener\">BrutePrint<\/a>, which they say can be used to hijack fingerprint images.<\/p>\n\n\n\n<p>An attack like BrutePrint could present a significant threat to <a href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\">passkeys<\/a>, an increasingly popular way to replace passwords with authentication methods like fingerprint authentication or face recognition.<\/p>\n\n\n\n<p>And the attack is cheap to carry out. &#8220;The adversarial equipment is mainly a printed circuit board (PCB), which is inexpensive and universal,&#8221; the researchers wrote. &#8220;For specific smartphone models, adaptive flexible printed circuit (FPC) is required. The equipment costs around 15 dollars in total.&#8221;<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/google-passkeys\/\">Google Launches Passkeys in Major Push for Passwordless Authentication<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bypassing Attempt Limits<\/h2>\n\n\n\n<p>Simply put, BrutePrint acts as a middleman to bypass any attempt limits and to hijack fingerprint images. &#8220;Specifically, the bypassing exploits two zero-day vulnerabilities in smartphone fingerprint authentication (SFA) framework, and the hijacking leverages the simplicity of SPI [Serial Peripheral Interface] protocol,&#8221; the researchers wrote.<\/p>\n\n\n\n<p>The two zero-days leveraged in the attack, either of which can be used to bypass attempt limits, are a Cancel-After-Match-Fail (CAML) flaw and a Match-After-Lock (MAL) flaw. &#8220;Instead of an implementation bug, CAMF and MAL leverage logical defects in the authentication framework,&#8221; the researchers wrote. &#8220;Therefore, it exists across various models and OSes.&#8221;<\/p>\n\n\n\n<p>Trying the attack on 10 different smartphone models with updated operating systems, the researchers were able to go three times over the attempt limit on Touch ID \u2013 and they successfully enabled unlimited attempts on Android devices, clearing the way for brute-force attacks.<\/p>\n\n\n\n<p>They tested the attacks on the following devices, covering iOS, Android, and HarmonyOS: Apple iPhone SE and iPhone 7, Samsung Galaxy S10+, OnePlus 5T and 7 Pro, Huawei P40 and Mate30 Pro 5G, OPPO Reno Ace, Vivo X60 Pro, and Xiaomi Mi 11 Ultra.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\">Mobile Malware: Threats and Solutions<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fingerprint Image Hijacking<\/h2>\n\n\n\n<p>For fingerprint image hijacking, the researchers took advantage of a weakness in fingerprint sensors&#8217; SPI protocol to enable man-in-the-middle attacks.<\/p>\n\n\n\n<p>&#8220;SFA sensors except Touch ID do not encrypt any data and lack mutual authentication,&#8221; they wrote. &#8220;Together with the frequency that is possible for injection, the situation leads SFA vulnerable to MITM attack on SPI.&#8221;<\/p>\n\n\n\n<p>&#8220;Fingerprint image hijacking is feasible on all devices except for Apple, which is the only one that encrypts fingerprint data on SPI,&#8221; they added.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/05\/BrutePrint-1.jpg\" alt=\"BrutePrint fingerprint attack\" class=\"wp-image-30235\" width=\"868\" height=\"435\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint-1.jpg 868w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint-1-300x150.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint-1-768x385.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint-1-150x75.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint-1-696x349.jpg 696w\" sizes=\"(max-width: 868px) 100vw, 868px\" \/><figcaption class=\"wp-element-caption\">BrutePrint attack overview<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to Respond to the BrutePrint Threat<\/h2>\n\n\n\n<p>To mitigate the CAMF flaw, the researchers recommended an additional error-cancel attempt limit setting \u2013 and more importantly, they urged vendors of fingerprint sensors to encrypt key data.<\/p>\n\n\n\n<p>And it&#8217;s not just about smartphones \u2013 they warned that BrutePrint could also be applied to other biometric systems.<\/p>\n\n\n\n<p>&#8220;The unprecedented threat needs to be settled in cooperation of both smartphone and fingerprint sensor manufacturers, while the problems can also be mitigated in OSes,&#8221; they wrote. &#8220;We hope this work can inspire the community to improve SFA security.&#8221;<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">The Best Password Managers for Business &amp; Enterprises<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Best Identity and Access Management (IAM) Solutions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\">Best Antivirus Software<\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6ec81dd96a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ec81dd96a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ec81dd96a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ec81dd96a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ec81dd96a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ec81dd96a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ec81dd96a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. Yiling He of China&#8217;s Zhejiang University and Yu Chen of Tencent Security&#8217;s Xuanwu Lab are calling the attack BrutePrint, which they say can be used to hijack fingerprint images. An attack like BrutePrint could present a [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":30232,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18],"tags":[553,2369,3790,555,3414,32006,31961,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[378,295,286],"class_list":["post-30231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile","tag-android","tag-cloud-security","tag-cybersecurity","tag-mobile-security","tag-network-security","tag-passkeys","tag-passwordless","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-endpoint-security","b2b_product-mobile-device-management","b2b_product-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BrutePrint Brute-Force Attack Bypasses Biometric Authentication<\/title>\n<meta name=\"description\" content=\"A new attack method can hijack fingerprint authentication, a major threat to any system relying on fingerprint images.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BrutePrint Brute-Force Attack Bypasses Biometric Authentication\" \/>\n<meta property=\"og:description\" content=\"A new attack method can hijack fingerprint authentication, a major threat to any system relying on fingerprint images.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T02:53:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T18:15:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"868\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication\",\"datePublished\":\"2023-05-23T02:53:24+00:00\",\"dateModified\":\"2023-05-26T18:15:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\"},\"wordCount\":528,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg\",\"keywords\":[\"Android\",\"cloud security\",\"cybersecurity\",\"mobile security\",\"network security\",\"passkeys\",\"passwordless\",\"security\",\"Web security\"],\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\",\"name\":\"BrutePrint Brute-Force Attack Bypasses Biometric Authentication\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg\",\"datePublished\":\"2023-05-23T02:53:24+00:00\",\"dateModified\":\"2023-05-26T18:15:27+00:00\",\"description\":\"A new attack method can hijack fingerprint authentication, a major threat to any system relying on fingerprint images.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg\",\"width\":868,\"height\":435,\"caption\":\"fingerprint spoof\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BrutePrint Brute-Force Attack Bypasses Biometric Authentication","description":"A new attack method can hijack fingerprint authentication, a major threat to any system relying on fingerprint images.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/","og_locale":"en_US","og_type":"article","og_title":"BrutePrint Brute-Force Attack Bypasses Biometric Authentication","og_description":"A new attack method can hijack fingerprint authentication, a major threat to any system relying on fingerprint images.","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/","og_site_name":"eSecurity Planet","article_published_time":"2023-05-23T02:53:24+00:00","article_modified_time":"2023-05-26T18:15:27+00:00","og_image":[{"width":868,"height":435,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication","datePublished":"2023-05-23T02:53:24+00:00","dateModified":"2023-05-26T18:15:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/"},"wordCount":528,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg","keywords":["Android","cloud security","cybersecurity","mobile security","network security","passkeys","passwordless","security","Web security"],"articleSection":["Mobile"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/","name":"BrutePrint Brute-Force Attack Bypasses Biometric Authentication","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg","datePublished":"2023-05-23T02:53:24+00:00","dateModified":"2023-05-26T18:15:27+00:00","description":"A new attack method can hijack fingerprint authentication, a major threat to any system relying on fingerprint images.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/BrutePrint.jpg","width":868,"height":435,"caption":"fingerprint spoof"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/bruteprint-fingerprint-authentication-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30231"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30231"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30231\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30232"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=30231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=30231"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=30231"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=30231"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=30231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}