Malicious software hijacks your phone’s microphone and camera to record your PIN
New software could threaten the security of mobile banking
A research paper from the University of Cambridge has outlined how PIN numbers used on smartphones can be recorded by hijacking the device’s camera and microphones.
The news is especially worrying as the rise of mobile banking means that PIN numbers entered into smartphones are often used to secure more than just the phone’s basic functionality.
The researchers, Laurent Simon and Ross Anderson, used a custom piece of software called PIN Skimmer to grab the PIN numbers. This program hijacks phones’ microphones to detect when you tap the touchscreen and then syncs this with data from the camera to work out where on the screen you pressed.
For example, when right-handed individuals press a button in the top left hand corner of their phone’s screen they often tilt the phone towards their thumb with their supporting fingers. This changes position of the user’s face as recorded by the front-facing camera, giving the program a unique marker that corresponds with a number on screen.
The research was carried out on a pair of Android-powered smartphones, a Nexus S and Galaxy S3, and under test conditions PIN Skimmer was able to work out more than 50 per cent of four digit PIN numbers after five attempts and 60 per cent of eight digit numbers after ten attempts.
One step in the malware’s process even presents users with a game where they have to match pairs of icons that appear onscreen. The program can record data from the camera during the game and then use this as a reference guide, matching how the user appears in the camera to where they’ve touched the screen.
The researchers suggested methods of obstructing the malware, but noted that randomising the order in which numbers appear on an onscreen keypad would “cripple usability” whilst employing longer PIN number would affect “memorability and usability”.
More “drastic” solutions included getting rid of passwords altogether in favour of face recognition or fingerprint scanners, although neither of these methods are yet common.
"If you're developing payment apps [for mobiles], you'd better be aware that these risks exist," Professor Anderson told the BBC.
An illustration of how the position of the phone's camera is changed as users reach for different parts of the keyboard. Image credit: Laurent Simon/Ross Anderson/University of Cambridge
Life & Style blogs
9 reasons Greece's experiment with the radical left is doomed to failure
Have we reached 'peak food'? Shortages loom as global production rates slow
Greece elections: Syriza and EU on collision course after election win for left-wing party
British grandmother Lindsay Sandiford faces execution by firing squad in Indonesia
Liberal Democrat minister defends comments suggesting immigration causes pub closures
King Abdullah dead: We can't afford not to hold Saudi Arabia's royals to account
- 1 Woman falls to her death as she celebrates marriage proposal at the edge of Ibiza cliff
- 2 Venezuela Expo Tattoo 2015: Extreme body art from 'Vampire Woman' to 109mm earlobes
- 3 Saudi preacher who 'raped and tortured' his five -year-old daughter to death is released after paying 'blood money'
- 4 Dad attempts revenge on teenage daughter, plan backfires spectacularly
- 5 Ball pool for adults opens in London
iJobs Gadgets & Tech
£6240 per annum: Recruitment Genius: This company is a well established websit...
£40000 - £60000 per annum: Recruitment Genius: This is a fantastic opportunity...
£25000 - £35000 per annum: Recruitment Genius: A skilled .NET developer with e...
£25000 - £30000 per annum: Recruitment Genius: This IT support company are cur...