Data Breach

Biometric data of 1M leaked via an unsecured Suprema owned database

Researchers discovered an unsecured database online owned by Suprema that contained the fingerprints and facial recognition information of one million people.

Researchers from vpnMentor discovered the personal and biometric data (i.e. facial recognition and fingerprint information) of more than a million people exposed online on an unsecured database owned by the Suprema biometric security company.

The 23-GB ElasticSearch archive was discovered earlier in August, data contained in the database were collected from customers utilizing BioStar 2.

Data was collected by the UK Metropolitan police, small local businesses and governments globally.

Suprema developed the BioStar 2 software that allows to implement control access using biometric data, including facial recognition and fingerprinting. Currently, the BioStar 2 is used by more than 6,000 organizations, including businesses, governments, financial organizations and the UK Metropolitan Police.

“The data leaked in the breach is of a highly sensitive nature. It includes detailed personal information of employees and unencrypted usernames and passwords, giving hackers access to user accounts and permissions at facilities using BioStar 2.” reads the post published by vpnMentor. “Malicious agents could use this to hack into secure facilities and manipulate their security protocols for criminal activities.”

vpnMentor experts explain that this data leak endangers both the organizations involved, as well as their employees.

The archive included 27.8 million records that also contained sensitive data like employee home address and emails, employee records and security levels and more.

The leak affected several organizations worldwide, some examples of the impacted businesses included:

USA

United Kingdom

Germany

  • Identbase – Data belonging to this supplier of commercial ID and access card printing technology was also found in the exposed database.

Scammers could perform various fraudulent activities by combining users’ fingerprint records with personal details, usernames, and passwords.

One of the most disconcerting issues of this case is that biometric data was stored in plain text.

At the time it is not possible to determine if the archive has been accessed by third parties, below the timeline shared by vpnMentor.

  • Date discovered: 5th August 2019
  • Date vendors contacted: 7th August 2019
  • Date of Action: 13th August, the breach was closed

Experts pointed out that BioStar 2 was very uncooperative, vpnMentor team made numerous attempts to contact the company over email, without success.

Suprema Inc. is currently investigating the incident.

“Facial recognition and fingerprint information cannot be changed. Once they are stolen, it can’t be undone. The unsecured manner in which BioStar 2 stores this information is worrying, considering its importance, and the fact that BioStar 2 is built by a security company.” concludes vpnMentor.

“Instead of saving a hash of the fingerprint (that can’t be reverse-engineered) they are saving people’s actual fingerprints that can be copied for malicious purposes.

Putting all the data found in the leak together, criminals of all kinds could use this information for varied illegal and dangerous activities.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Suprema data leak, biometric)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

3 minutes ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

4 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

14 hours ago

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

20 hours ago

UK’s Legal Aid Agency discloses a data breach following April cyber attack

The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…

23 hours ago

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…

1 day ago