Podcast
Root Causes 382: Mobile Phone Malware Steals Faces for Access


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 29, 2024
New malware photographs users' faces to defeat authentication mechanisms. We explain the that biometrics are not "secrets" and discuss the continuing progression of attacks to steal biometrics.
Podcast Transcript
Lightly edited for flow and brevity.
Authentication should be based on secrets. Whether they're symmetric secrets, username and password, right, or something you know as a secret, right? Which would be like a one-time password which is generated by some sort of a computing system. Or Tim, good old-fashioned PKI.
Right? Private key, public key secrets that are broken in half. Great. Your face is not a secret. And so any form of authentication that uses it is weak. And this malware proves it.
And in that case, it's kind of a perfect form of weak authentication because it's just good enough. It's just good enough to keep out people in a short proximity to the device.
And that's why it's used. But the problem, Tim, is it's overused. Biometrics are overused for other forms of authentication and that's the problem.
So number two is alright, this is the main message and boy are we ever good at burying the lead. But here's the main message.
I don't think the article should be most interesting to the average user of a phone. I think, security architects, you are enamored with biometrics, and I know why. It's because it's dead easy for the user. The user experience is just cheap as chips, right?

