Categories: CryptoHackingSecurity

Chaos Computer Club claims to have defeated Apple TouchID

Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface.

Hackers members of the Chaos Computer Club claim to have defeated Apple TouchID fingerprint sensor for the iPhone 5S, just after the start of its sale to the public. The Chaos Computer Club in Germany announced late Saturday to have successfully bypassed the biometric security on the Apple’s Touch ID fingerprint sensor by using materials that can be found in almost every household, it seems that they made it by photographing an iPhone user’s fingerprint from a glass surface and using that captured image to verify the user’s login credentials.

The hack is embarrassing, in recent days a series of bugs and security issues were found on the last version of the popular Apple OS, iOS 7, in particular the lockscreen features is affected by serious flaws.

The Apple TouchID it the technology developed by Apple to replace passcode on its mobile and help protect users’ devices, it is based on a sensor placed under the home button and it is designed to substitute the four-digit passcode to unlock the handset and authorize iTunes Store purchases.

“Your fingerprint is one of the best passcodes in the world. It’s always with you, and no two are exactly alike. Touch ID is a seamless way to use your fingerprint as a passcode. With just a touch of the Home button of your iPhone 5s, the Touch ID sensor quickly reads your fingerprint and automatically unlocks your phone. You can even use it to authorize purchases from the iTunes Store, App Store, and iBooks Store.” advertise Apple.

But is it really so? Apple TouchID technology had caused a lot of controversy in recent days, according to some experts it is a threat to privacy being used to manage fingerprint users. The Snowden case and the revelations about the PRISM surveillance program brought down the confidence of users in companies that have been overwhelmed by the scandal, Apple included.

Now the hackers at popular Chaos Computer Club have demonstrated the inadequacy of the proposed solution even in technical, the Apple TouchID could be avoided as they have written in a blog post:

“This demonstrates — again — that fingerprint biometrics is unsuitable as access control method and should be avoided,” the group wrote in a blog post detailing its bypass:

First, the fingerprint of the enrolled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white woodglue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone. This process has been used with minor refinements and variations against the vast majority of fingerprint sensors on the market.

“We hope that this finally puts to rest the illusions people have about fingerprint biometrics,”  “It is plain stupid to use something that you can´t change and that you leave everywhere every day as a security token.” added CCC spokesperson Frank Rieger.

According the hackers at the Chaos Computer Club the new Apple Touched sensor has just a higher resolution compared to the previous version, the hacker with nickname Starbug remarked that fingerprints should not be used to secure anything.

Following a video posted on the hack:

 

At this point the only question to be clarified is if the hackers will claim to the bounty of more than $16,000 in cash offered to the first person to hack the Apple TouchID fingerprint sensor.

IsTouchIDhackedyet.com is the brainchild of Nick DePetrillo, an independent security researcher whose last major public research was 2010’s Carmen San Diego Project, it announced on its Web site that it was waiting for the group to upload video of the hack as proof of the hack.

Rewards include also a patent application from CipherLaw for the hack process, some Scotch, and a book of erotica.

Lesson learned … nothing is secure!

Pierluigi Paganini

(Security Affairs –  Apple TouchID, privacy, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.