21 February 2024

PrintListener attack allows to recreate fingerprints from touchscreen sounds


PrintListener attack allows to recreate fingerprints from touchscreen sounds

Recent research has uncovered a weakness in biometric security systems, which can be abused to recreate fingerprints solely from the sounds they make on touchscreen devices.

Devised by a collaborative effort between researchers in the United States and China, the new technique called ‘PrintListener,’ has demonstrated efficacy in cracking biometric security measures, achieving success rates of up to 27.9% for partial fingerprints and 9.3% for complete fingerprints within just five attempts.

PrintListener is a side-channel attack designed to exploit the inadvertent capture of friction sounds produced during routine touchscreen interactions. By leveraging advanced algorithms for signal processing, PrintListener can extract precise fingerprint patterns from these captured sounds, effectively bypassing biometric security measures reliant on fingerprint authentication.

PrintListener is able to operate covertly, utilizing sounds captured during everyday activities such as voice or video chats. This provides attackers with a stealthy means of harvesting fingerprint data without arousing suspicion, paving the way for sophisticated dictionary attacks against biometric authentication systems.

“The attack scenario of PrintListener is extensive and covert. It only needs to record users’ fingertip friction sound and can be launched by leveraging a large number of social media platforms,” the researchers explained.

Last December, security researchers with Jamf Threat Labs shared details of a new post-exploitation tampering technique that allows to carry out covert attacks while fooling iPhone users into believing that their device is running in Lockdown Mode when it's not.


Back to the list

Latest Posts

Iranian hackers target critical infrastructure, selling network access data on cybercriminal forums

Iranian hackers target critical infrastructure, selling network access data on cybercriminal forums

The advisory details tactics and techniques used by Iranian hackers to breach networks and collect valuable data.
17 October 2024
US authorities charge Sudanese brothers linked to Anonymous Sudan DDoS operation

US authorities charge Sudanese brothers linked to Anonymous Sudan DDoS operation

Anonymous Sudan carried out numerous DDoS attacks targeting US and international organizations.
17 October 2024
Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Russian state-backed hackers have been outsourcing cyberespionage tasks to cybercriminals, particularly those targeting Ukraine.
16 October 2024