Categories: HackingMobileSecurity

The iPhone 6 Touch ID fingerprint reader is still vulnerable to hack

Security expert Marc Rogers, chief security researcher at Lookout Mobile Security, revealed that Apple’s Touch ID is still vulnerable to hack on iphone 6.

A few days ago we discussed about the availability on the Internet of the exploit for iOS 7.x based devices, due to the diffusion of Apple Smartphones and tablets the security issued attracted the attention of the media as already occurred in the past for other flaws. One of the most debated security issue is related to the Touch ID fingerprint reader that appeared flawed for the iPhone 5S. My readers remember that exactly one year ago the Chaos Computer Club claimed to have bypassed the biometric security technology designed by Apple simply by making a copy of a fingerprint photographed on a glass surface.

Apple Touch ID hack ios6Apple Touch ID hack ios6

Now Apple has released the new iPhone 6, a jewel rich of improvements, especially under the security perspective, but experts have discovered that Apple Touch ID still vulnerable to hack.

Marc Rogers, chief security researcher at Lookout Mobile Security, discovered that the Touch ID fingerprint reader on the new iPhone 6 can be fooled by the same trick that was working with iPhone 5S.

“I don’t think people need to worry just yet, but there are distinct flaws that could lead to problems down the line,” “Sadly there has been little in the way of measurable improvement in the sensor between these two devices,” Rogers wrote in a blog post. “Fake fingerprints created using my previous technique were able to readily fool both devices.”

In time I’m writing Apple still hasn’t responded to a request for comment to the researcher. Technically Rogers used fingers coated in a gummy substance like Elmer’s glue to lift and replicate fingerprints.

“I used a technique demonstrated by Tsutomu Matsumoto in his 2002 paper “The Impact of Artificial “Gummy” Fingers on Fingerprint Systems”. In this technique, you take the cleaned print image and without inverting it, print it to transparency film. Next, you take the transparency film and use it to expose some thick copper clad photosensitive PCB board that’s commonly used in amateur electrical projects. After developing the image on the PCB using special chemicals, you put the PCB through a process called “etching” which washes away all of the exposed copper leaving behind a fingerprint mold. Smear glue over this and when it dries, you have a fake fingerprint.” explained in a previous post describing the hack on iPhone 5s.

The impact of the flaw could be serious considering that Touch ID is the authentication system adopted by Apple for Apple Pay, a system implemented starting from the latest iPhone 6 and based on new near-field communication chip and credit card management software with Touch ID to allow people carry out mobile payments by tapping their device with an NFC reader and confirming the purchase with their fingerprint. Touch ID is a key component for the overall payment architecture, it was used with the purpose to make attractive to consumers the new payment method

Rogers explained that the sensor has been improved since its previous version but that anyway if fails the fingerprint validation.

“Another sign that the sensor may have improved is the fact that slightly “dodgy” fake fingerprints that fooled the iPhone 5S did not fool the iPhone 6. To fool the iPhone 6 you need to make sure your fingerprint clone is clear, correctly proportioned, correctly positioned, and thick enough to prevent your real fingerprint coming through to confuse it.” said Rogers.

Rogers hasn’t demonized the Touch ID, he considers it an effective security control that is anyway that is underused with unique usage for unlock of the phone.

Anyway Rogers remarks that since the system involves credit cards it would be better protected by Touch ID and a second authentication factor.

Let’s wait for Apple reply.

Pierluigi Paganini

(Security Affairs – iOS6, Touch ID)

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

5 hours ago

Pwn2Own Berlin 2025: total prize money reached $1,078,750

Pwn2Own Berlin 2025 wrapped up with $383,750 awarded on the final day, pushing the total…

10 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

1 day ago

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

1 day ago

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

1 day ago