Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Privacy

Hackers Make a Fake Hand to Beat Vein Authentication (vice.com) 66

Devices and security systems are increasingly using biometric authentication to let users in and keep hackers out, be that fingerprint sensors or perhaps the iPhone's FaceID. Another method is so-called 'vein authentication,' which, as the name implies, involves a computer scanning the shape, size, and position of a users' veins under the skin of their hand. But hackers have found a workaround for that, too. From a report: On Thursday at the annual Chaos Communication Congress hacking conference in Leipzig, Germany, security researchers described how they created a fake hand out of wax to fool a vein sensor. "It makes you feel uneasy that the process is praised as a high-security system and then you modify a camera, take some cheap materials and hack it," Jan Krissler, who goes by the handle starbug, and who researched the vein authentication system along with Julian Albrecht, told Motherboard over email in German. Vein authentication works with systems that compare a user's placement of veins under their skin compared to a copy on record. According to a recent report from German news wire DPA, the BND, Germany's signals intelligence agency, uses vein authentication in its new headquarter building in Berlin.

One attraction of a vein based system over, say, a more traditional fingerprint system is that it may be typically harder for an attacker to learn how a user's veins are positioned under their skin, rather than lifting a fingerprint from a held object or high quality photograph, for example. But with that said, Krissler and Albrecht first took photos of their vein patterns. They used a converted SLR camera with the infrared filter removed; this allowed them to see the pattern of the veins under the skin.

This discussion has been archived. No new comments can be posted.

Hackers Make a Fake Hand to Beat Vein Authentication

Comments Filter:
  • it is usually not very hard to copy.

    • Are veins free as in beer or free as in speech?

    • by Anonymous Coward

      The utter stupidity of the idiots who still think biometrics are a good idea in the face of all the evidence to the contrary simply doesn't count. Because tt was hackers, that hacked, with hacks! You really can't begin to defend against hackers, hacking, with hacks. Because they're hackers, and they do hacking, with hacks! Everyone knows this!

      Well, at least msmash cherry-picks the "news" to look like that.

  • by Anonymous Coward

    Which idiot decided to use an identification as an authorization. Someone deserves to be beaten to pulp for being so stupid. Identification is not authorization, especially when it cannot determine intent. More specifically whether the person being identified is actively seeking service pr is being presented under duress and external force

    • Very few do, but it is a significant increase in security to do so. As others stated you seem to have confused your terms.
      Identification is WHO YOU ARE. Bio-metrics handy for that.
      Authentication is proving who you are or at least that you have the associated secret/device.
      Authorisation is simply given who you are, are you allowed to perform Y Action or Access X Resource. e.g. an ACL lookup, adding biometrics to this would be a significant increase from what 99.999% of systems do today. basically authoris
  • by JustAnotherOldGuy ( 4145623 ) on Tuesday January 01, 2019 @02:39AM (#57887424) Journal

    I'm sure at the time this seemed like something that would be damn near impossible to spoof, and I can see where the idea was so compelling that it made it all the way into implementation and deployment.

    When deployed it was essentially un-spoofable because it was a new kind of "lock"; no one had made a "key" for it because this kind of lock never existed before.

    But as soon as the lock (in the form of a vein scanner) appeared, the "getting defeated" part was sure to follow.

    I think the surprising part was that it was defeated fairly quickly...I'm sure the people using this thing expected it to be the end-all-be-all of security for the next decade or so.

    • by Anonymous Coward

      Prior Art. Old 1998 Sony see through camera. And many others were modded. Even an Iris scan can be defeated, and 3d printing will only get better.
      Face scans have moved to 256 points, up from 64 or so. Use a bolo to read fresh keypad codes. The experts still say voice is best.

    • This will be interesting to follow. The question I have is - is this fundamentally easily hackable, or are the current implementations just too sloppily done?

      I really want to see more info on just how accurate and detailed these photos can be at a distance.

      • Re:Ay Yup (Score:4, Insightful)

        by ShanghaiBill ( 739463 ) on Tuesday January 01, 2019 @04:03AM (#57887576)

        ... or are the current implementations just too sloppily done?

        An obvious improvement would be to take multiple images a fraction of a second apart, and look for a pulse. Some fingerprint scanners already do this.

        More importantly, any biometric identifier should be used IN ADDITION to a password or PIN for anything important.

        • The Fujitsu palm scanners do just that (look for blood flow that is), or at least claim to. When I worked with those scanners, I always idly wondered just how difficult it would be to take the image, use a 3d printer to make a fake hand with veins and then pump some sort fluid through it to fool the system.

          I also wondered about verifying the blood flow thing, but was never able to verify due to lack of access to a supply of corpse hands.

  • Identification, Authentication, and Authorization are all VERY different things.

    Identification = Information about who you are
    Authentication = verifying that ID information being provided is correct through a predefined/established process
    Authorization = gaining permissions or actual access AFTER authentication has checked out.

    bio-metrics foolishly rolls all 3 of those things into ONE and that is just bad security practice and it's not going to likely change. The fact that this is still being pursued and d

    • bio-metrics foolishly rolls all 3 of those things into ONE and that is just bad security practice and it's not going to likely change.
      No it does not.
      Authentication and Authorization are still separate. Or are you suddenly "root" when you put my fake hand on my sensor?

      • Goal Post moving fallacy and straw-man fallacy argument well done... Authorization does not automatically mean "root" access. Gaining root access is irrelevant regardless if such access is going to be attempted. Is a person hacking into your email account search for root access too? Not likely, meaning root access is not the only goal possible.

        The point is that Authorization is a piece of a pyramid that rests on top of Identification and Authentication. When either of those base pieces fail, the top piec

        • The parent claimed that Authentification and Authorization is the same as soon as I use my eye ball or my finger print to authentificate me. No, it is not ... go away with your fallacy mind ...

      • by AHuxley ( 892839 )
        That would depend on the building and staff.
        A human guard who can remember names and faces and new biometric authentication? Then you know someone put some money into a "secret" project.
        That just get the person in the front door.
        What they do later to get into their computer network is often different.
  • by mentil ( 1748130 ) on Tuesday January 01, 2019 @05:40AM (#57887726)

    If I made a fake hand, I'd use it to beat something else.

    Some eggs, for instance.

    • If I made a fake hand, I'd use it to beat something else.

      Glad it wasn't just me! I got 7 words in and that's where my mind was.

      Some eggs, for instance.

      Well played sir.

      But since we both find these funny, have a complementary one. Here's a recent "don't masturbate" poster thing which is just hilarious:

      https://i0.wp.com/www.wehunted... [wp.com]

      If you don't want to visit the link, the text says:

      "Strugling with the addiction to masturbation? Reach out to me and we will beat it toether." -- Jesus

  • This is not anything fantastic. It is no great feat to make a fake "hand" to fool a deep-vein-palm-scanner. It changes nothing.

    Fingerprints- you leave them everywhere.
    DNA- you leave it everywhere.
    Face- you show it everywhere.
    Iris- visible when look at any device.
    Hand/finger shape- not live, visible in any photo.

    The whole point of deep vein scan is that what is being scanned is never left anywhere (latent) and not casually visible or obtainable. The veins are beneath the skin in the palm, in an area rare

  • Biometrics is turning into the ligne Maginot of the IT world, a fixed defense that someone, somewhere will always find a way around.

    • Biometrics is turning into the ligne Maginot of the IT world, a fixed defense that someone, somewhere will always find a way around.

      Since this "exploit" requires the bad actor somehow getting photographs of the person's palm, some nice lightweight cotton gloves defeats the hack.

      I wonder how any people walk around with their palms exposed anyhow?

      If Biometrics are the only thing giving access to whatever is classified - well, that's just stupid. Even my phone requires me to input a PIN every so often in order to use the fingerprint reader. And if someone actually went to the trouble of raising my prints they better pick the right one

  • in places that matter a human guard sits behind glass and knows all the staff allowed into an area.
    Biometric authentication gets you part way in.
  • As usual for high tech, sex applications lead the way with fake body parts with accurate veining.

One way to make your old car run better is to look up the price of a new model.

Working...