New hack clones fingerprints just by listening to fingers swipe screens

PrintListener hacking technique can steal people’s fingerprints through a smartphone’s microphone

Anthony Cuthbertson
Tuesday 20 February 2024 16:03 GMT
Comments
Study Uncovers What Makes Fingerprints Infinitely Unique

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Researchers have figured out how to recreate a person’s fingerprints from just the sound they make while swiping a touchscreen.

The discovery, made by a team from the US and China, could have profound implications for biometric security systems that are used in everything from smartphones to door access locks.

The technique, called PrintListener, reconstructs the pattern of a finger’s papillary lines through the acoustic signals it generates as it slides across a screen.

Researchers have figured out a novel method to crack biometric security measures
Researchers have figured out a novel method to crack biometric security measures (iStock/ Getty Images)

Hackers could use the microphone found within the smartphone to record the sound and steal a victim’s fingerprint, according to the researchers.

“Due to its widespread use, fingerprint leakage may cause sensitive information theft, enormous economic and personnel losses, and even a potential compromise of national security,” the researchers noted in a paper detailing their findings.

“The attack scenario of PrintListener is extensive and covert. It only needs to record users’ fingertip friction sound and can be launched by leveraging a large number of social media platforms.”

Using PrintListener in “realistic scenarios”, the researchers were able to achieve a partial reconstruction of a person’s fingerprint 27.9 per cent of the time and a full reconstruction 9.3 per cent of the time.

The method was detailed in a research paper titled ‘PrintListener: Uncovering the vulnerability of fingerprint authentication via the finger friction sound’, written by the team from the University of Colorado in the US and Tsinghua University, Wuhan University and Huazhong University of Science and Technology in China.

Potential ways to protect against fingerprint cloning include specialised screen protectors on mobile devices, the researchers noted, though new sound analysis techniques could also be developed.

The best countermeasure to prevent fingerprints being stolen is to change the way we interact with smartphones and screens. “For example, users try not to swipe their fingers on the phone screen when making audio and video calls on social media platforms,” the paper noted.

The global fingerprint biometrics market is anticipated to be worth nearly $75 billion by 2032, according to a recent report from Allied Market Research, up from $21 billion in 2022.

The report also noted that the projection could be impacted by “operational concerns related to privacy and security”.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in