This article was published on August 10, 2015

HTC caught storing images of your fingerprints without protection


HTC caught storing images of your fingerprints without protection

Security researchers have discovered a bombshell: HTC was storing high-resolution images of your fingerprints directly on your Android phone with little protection.

In a white paper released by FireEye researchers last week, the group outlined how simple it was to recover the image files from an HTC phone, the One Max.

Screen Shot 2015-08-10 at 4.20.38 PM

 

The <3 of EU tech

The latest rumblings from the EU tech scene, a story from our wise ol' founder Boris, and some questionable AI art. It's free, every week, in your inbox. Sign up now!

In the case of the One Max, HTC saved images of configured fingerprints directly to phone storage at /data/dbgraw.bmp with ‘world-readable’ permissions, meaning any app could steal the user’s fingerprints.

Even worse, every time the fingerprint sensor was swiped the image was updated, so a malicious process could steal multiple images without detection.

The bug was fixed by HTC after FireEye notified the company of how dangerous it was.

The group also identified another attack that affects other Android phones where malware can circumvent protections in the operating system to access the fingerprint hardware directly.

Apple uses a “secure enclave” to store fingerprint data, but never saves the actual image so it’s not possible to retrieve a scan of the fingerprint, though a group did successfully break into an iPhone using a silicon representation of a stolen fingerprint.

Today’s news shows that many phone vendors don’t go out of their way with the security of your biometrics and it’s hard to know exactly what they’re doing with your fingerprint data or if it’s being secured correctly.

Image credit: Shutterstock

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Also tagged with