Feeds

Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS

Sammy's newbie cooked slower than iPhone, also costs more to build

The Essential Guide to IT Transformation

The much-hyped fingerprint scanner on Samsung’s flagship handset the Galaxy S5 can be fooled just days after the device was launched.

Researchers at Germany’s Security Research Labs (SRLabs) publicised their findings in a YouTube clip. According to the narrator, the scanner was hoodwinked "under lab conditions, but is based on nothing more than a camera phone photo" of a print left on the phone's screen.

A mould is then made from the digital photo of the fingerprint, into which wood glue is poured: the resulting shape can be pressed against the S5's scanner to authenticate as the victim.

The hack is concerning given that it grants access to “highly sensitive apps” such as PayPal, giving “a would-be attacker an even greater incentive to learn the simple skill of fingerprint spoofing”, the researchers said.

Youtube Video

PayPal claimed fingerprint authentication still offers “an easier and more secure way to pay” on mobiles than passwords and PINs. It issued the following statement in a bid to head of a potential consumer backlash:

PayPal never stores or even has access to your actual fingerprint with authentication on the Galaxy S5. The scan unlocks a secure cryptographic key that serves as a password replacement for the phone. We can simply deactivate the key from a lost or stolen device, and you can create a new one. PayPal also uses sophisticated fraud and risk management tools to try to prevent fraud before it happens. However, in the rare instances that it does, your eligible transactions are covered by our buyer protection policy.

Another criticism of Samsung is that it has failed to learn from the mistakes of other tech companies which have gone before it in trying to implement effective biometric authentication systems.

Most notably, the Touch ID fingerprint scanner on Apple’s iPhone 5S was hacked by Chaos Computer Club just 48 hours after its launch last September, using a similar method to SRLabs.

Unlike the Apple device, the S5 currently does not require a password to authenticate after a certain number of incorrect attempts to swipe in. This means attackers can theoretically have as many goes as they like as long as they reboot the handset every so often.

This kind of oversight is surprising considering the amount of money Samsung has spent on building its latest star handset.

A teardown by analyst IHS iSuppli estimates the total bill of materials at $256.52 (£153) for a 32GB version, significantly more than an iPhone 5S with the same amount of NAND flash memory, which comes in at $207 (£123.80).

Major costs attached to the new device include the Qualcomm MSM8974AC processor at an estimated $41 (£24.50) which, when combined with NAND and DRAM, comes to $102.37 (£61).

The 1920x1080 OLED display is the next priciest component at $63, followed by the 16MP and 2MP cameras ($18.70, £11) and the 2 x 2800mAh 3.85V Li Ion batteries ($11, £6.60).

The fingerprint scanner is not broken out by cost although the market analyst claimed that the S5 has more sensors “than IHS has ever detected in a smartphone design”.

Samsung HQ couldn't immediately be reached for comment on the SRLabs research. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.