Malicious software hijacks your phone’s microphone and camera to record your PIN
New software could threaten the security of mobile banking
Wednesday 13 November 2013
A research paper from the University of Cambridge has outlined how PIN numbers used on smartphones can be recorded by hijacking the device’s camera and microphones.
The news is especially worrying as the rise of mobile banking means that PIN numbers entered into smartphones are often used to secure more than just the phone’s basic functionality.
The researchers, Laurent Simon and Ross Anderson, used a custom piece of software called PIN Skimmer to grab the PIN numbers. This program hijacks phones’ microphones to detect when you tap the touchscreen and then syncs this with data from the camera to work out where on the screen you pressed.
For example, when right-handed individuals press a button in the top left hand corner of their phone’s screen they often tilt the phone towards their thumb with their supporting fingers. This changes position of the user’s face as recorded by the front-facing camera, giving the program a unique marker that corresponds with a number on screen.
The research was carried out on a pair of Android-powered smartphones, a Nexus S and Galaxy S3, and under test conditions PIN Skimmer was able to work out more than 50 per cent of four digit PIN numbers after five attempts and 60 per cent of eight digit numbers after ten attempts.
One step in the malware’s process even presents users with a game where they have to match pairs of icons that appear onscreen. The program can record data from the camera during the game and then use this as a reference guide, matching how the user appears in the camera to where they’ve touched the screen.
The researchers suggested methods of obstructing the malware, but noted that randomising the order in which numbers appear on an onscreen keypad would “cripple usability” whilst employing longer PIN number would affect “memorability and usability”.
More “drastic” solutions included getting rid of passwords altogether in favour of face recognition or fingerprint scanners, although neither of these methods are yet common.
"If you're developing payment apps [for mobiles], you'd better be aware that these risks exist," Professor Anderson told the BBC.
An illustration of how the position of the phone's camera is changed as users reach for different parts of the keyboard. Image credit: Laurent Simon/Ross Anderson/University of Cambridge
Life & Style blogs
The Evil Within preview: a survival horror fan’s best worst nightmare
Porn film production likely to stop in Los Angeles after actor tests positive for HIV
Ice Bucket Challenge: ALS Association doesn't yet know what to do with all of the money raised
Anal sex study reveals climate of 'coercion'
iPhone 6 'release date' firmed up in leaked photos of Apple smartphone
Robin Williams Emmys tribute led by Billy Crystal criticised for including 'racist' joke about Muslim woman
The Rotherham child abuse scandal is a tale of apologists, misogyny and double standards
What do immigrants really think of Britain? Polish immigrant's Reddit post goes viral
Scottish independence TV debate: Pumped-up Alex Salmond bounces back in bruising second round against Alistair Darling
Do you realise just how foolish the UK looks?
With Douglas Carswell joining Ukip, my party has taken another giant step forward
- 2 Oil tanker with $100 million cargo goes missing off Texas coast
- 4 Saudi Arabia executes 19 in one half of August in 'disturbing surge of beheadings'
- < Previous
- Next >
iJobs Gadgets & Tech
£28000 - £30000 per annum + Benefits + Bonus: Harrington Starr: Junior VB.NET ...
£40000 - £50000 per annum + Benefits + Bonus: Harrington Starr: C# .NET Web De...
£45000 - £69999 per annum + Benefits + Bonus: Harrington Starr: C# Algo-Develo...
£60000 - £70000 per annum + Benefits + Bonus: Harrington Starr: Senior Data Sc...