CYBER SECURITY: VPN Mentor – When Biometrics go bad
GEÓ NewsTeam 5 years agoHowever, when the vpnMentor team contacted Biostar 2 to alert them to their data breach findings they found them “generally very uncooperative” their emails were ignored and when Biostar 2 was eventually contacted by phone they were told that the they “don’t speak to vpnMentor” before unceremoniously hanging up. Even attempts to contact Biostar 2’s GDPR compliance officer fell on stony ground. Eventually, after speaking to the more cooperative French branch over the phone, steps were taken by the company to close the breach. The vpnMentor team was able to access over 27.8 million records, a total of 23 gigabytes of data, which included the following access to client admin panels, dashboards, back end controls, Employee records and security levels and clearances and permissions as well as the hugely valuable Bio-metric data. One of the more surprising aspects of this leak was how unsecured the account passwords we accessed were. Plenty of accounts had ridiculously simple passwords, like “Password” and “abcd1234”. It’s difficult to imagine that people still don’t realize how easy this makes it for a hacker to access their account. Of course, many users did create more complicated and effective passwords that normally would be difficult to discover or decrypt. However, we were easily able to view passwords across the BioStar 2 database, as they were stored as plain text files, instead of being securely hashed. Maybe the biggest concern in this leak is its size. Biostar 2’s users are spread around the world, with potential future users including governments, banks, universities, defence contractors, police, and multinational businesses. The platform has over 1.5 million worldwide installations, and all of these could be vulnerable to this leak. The total number of people affected could be in the tens of millions. Facial recognition and fingerprint information cannot be changed. Once they are stolen, it can’t be undone. The unsecured manner in which Biostar 2 stores this information is worrying, considering its importance, and the fact that Biostar 2 is built by a security company. Instead of saving a hash of the fingerprint (that can’t be reverse-engineered) they are saving people’s actual fingerprints that can be copied for malicious purposes. Criminal hackers have complete access to admin accounts on Biostar 2. They can use this to take over a high-level account with complete user permissions and security clearances, and make changes to the security settings in an entire network. Not only can they change user permissions and lock people out of certain areas, but they can also create new user accounts – complete with facial recognition and fingerprints – to give themselves access to secure areas within a building or facility. Furthermore, hackers can change the fingerprints of existing accounts to their own and hijack a user account to access restricted areas undetected. Hackers and other criminals could potentially create libraries of fingerprints to be used any time they want to enter somewhere without being detected. Click Here to read the full report With thanks to vpnMentor.com“Unlike a password or pin, once stolen, fingerprint and facial recognition information cannot be retrieved leaving individuals exposed for the rest of their lives”
Author
-
Broadcasting Daily from Gibraltar Newsroom our dedicated desk editors and newsdesk team of Professional Journalists and Staff Writers work hand in hand with our established network of highly respected Correspondents & regional/sector specialist Analysts strategically located around the Globe (HUMINT) Our individual Desk Editors all have specific subject authority as Journalists, Researchers and Analysts covering AI, Autonomous Transport, Banking & Finance Technology, Cybersecurity, GeoCrime, Defence 3.0, Energy & Renewables, BioEconomy and Transport & Logistics. Contact the NewsTeam at [email protected]
View all posts