Researchers have discovered a new biometric attack method that can copy mobile device users’ fingerprints from the sound their fingers make by touching the screen. The study, carried out by scientists from China and the United States, reveals that it is possible to reconstruct fingerprints with a high success rate using acoustic analysis of touch gestures on smartphones or tablets.
The method, called PrintListener, poses a risk to user security as the biometric system based on fingerprints is widely used on personal devices and in private security systems. If an attacker manages to replicate a user’s fingerprint, they could potentially access personal data, bank accounts, or protected devices.
To carry out this breach, the attacker would need to infect the user’s device with malware that captures the sound generated by the finger touching the screen. The sound could be obtained when using applications such as WhatsApp, Skype, FaceTime, or Discord, among others.
The study highlights that PrintListener is a very sophisticated attack that requires overcoming technical hurdles such as detecting weak friction sounds, separating finger features from those of the users, and moving from primary to secondary fingerprint features.
According to researchers, PrintListener is one of the most complex attacks that currently exist, and it raises concerns about the vulnerability of fingerprinting as a biometrics method. The results obtained in real environments suggest that this system is not as secure as previously thought.
For more news like this, visit our Canal USB website. (With information from Andro4All)