Вештачка интелигенција

Safety of fingerprint authentication compromised: Malware circumvents PIN protection

Summary

The unique fingerprint authentication is no longer sufficient to protect the security of your personal information. Researchers from ThreatFabric have discovered that a new version of the Chameleon Android malware successfully bypasses fingerprint protection and enables the theft of PINs. […]

Sigurnost otiska prsta u opasnosti: Zlonamerni malver zaobilazi ovaštjenje PIN-om

The unique fingerprint authentication is no longer sufficient to protect the security of your personal information. Researchers from ThreatFabric have discovered that a new version of the Chameleon Android malware successfully bypasses fingerprint protection and enables the theft of PINs. Attackers use malicious methods to deceive users into granting accessibility service access. Once successful, attackers can change the phone’s lock from biometric to PIN.

Instead of quoting, it can be said that the new version of the Chameleon Android malware uses deception to bypass the fingerprint lock system and allows attackers access to the PIN.

This advanced malware disguises itself as legitimate Android applications, and then displays an HTML page that encourages the user to enable accessibility services on their phone. This permission provides the malware with access to modify the device’s lock settings. By transitioning from biometric to PIN lock, attackers open the door to PIN theft and compromise the security of the user’s personal information.

Despite the various security systems available on the market, malwares like Chameleon demonstrate that the security of mobile devices is still vulnerable to attacks. To protect oneself from such threats, experts recommend regular system updates, avoiding downloading applications from unofficial stores, and exercising caution when granting permissions for accessibility services.

Frequently Asked Questions:

1. How does the Chameleon Android malware work?
The Chameleon Android malware operates by disguising itself as legitimate Android applications and then displaying an HTML page that redirects users to change the lock from biometric to PIN.

2. How can one protect themselves from Chameleon malware?
To protect yourself from Chameleon malware or similar threats, it is recommended to regularly update your system, use reliable applications from official sources, and exercise caution when granting permissions for accessibility services.

3. Are mobile devices safe from malware?
Although there are multiple methods to secure mobile devices, malwares like Chameleon demonstrate that no system is entirely secure. Regular updates, careful selection of applications, and caution when using accessibility services can provide additional protection to devices.