search
HomeSystem TutorialWindows SeriesWindows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?

So, how can people hack past a Windows Hello fingerprint scan, and should you worry about it?

Can People Hack Windows Hello Fingerprint Scanners?

Windows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?

If a hacker wants to bypass a fingerprint scanner on a Windows machine, they're aiming to get past a service called Windows Hello. This service handles how you log into Windows, such as PINs, facial scans, and fingerprint scans.

As part of research into Windows Hello's strength, two white-hat hackers, Jesse D'Aguanno and Timo Teräs, posted a report on their website, Blackwing HQ. The report details how they breached three popular devices: the Dell Inspiron 15, Lenovo ThinkPad T14, and the Microsoft Surface Pro Type Cover.

How the Hackers Breached Windows Hello on the Dell Inspiron 15

For the Dell Inspiron 15, the hackers noticed they could boot into Linux on the laptop. Once logged into Linux, they can register their fingerprints in the system and give it the same ID as the Windows user they want to log into.

Then, they perform a man-in-the-middle attack on the connection between the PC and the sensor. They set it up so that when Windows goes to double-check that a scanned fingerprint is legitimate, it ends up checking the Linux database of fingerprints instead of its own.

To dodge Windows Hello, the hackers uploaded their fingerprints to the Linux database, assigned it the same ID as the user on Windows, and then tried to log into Windows with their fingerprints. During the authentication process, they redirected the packet to the Linux database, which told Windows that the user at the specified ID was ready to log in.

How the Hackers Breached Windows Hello on the Lenovo ThinkPad T14

For the Lenovo ThinkPad, the hackers discovered that the laptop used a custom encryption method to verify fingerprints. With some work, the hackers managed to decrypt it, giving them a way into the fingerprint verification process.

Once done, the hackers could force the fingerprint database to accept their fingerprint as the user's. Then, all they had to do was scan their fingerprint to access the Lenovo ThinkPad.

How the Hackers Breached Windows Hello on the Microsoft Surface Pro Type Cover

The hackers believed the Surface Pro would be the hardest device to crack, but they were surprised to find the Surface Pro lacked a lot of security measures for checking valid fingerprints. In fact, they discovered that they only had to dodge past one defense, then tell the Surface Pro that the fingerprint scan was successful, and the device let them in.

What Do These Hacks Mean for You?

Windows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?

These hacks may sound pretty scary if you use fingerprints to log into your laptop. However, it's essential to remember some crucial things before you forgo fingerprint scans entirely.

1. The Attacks Were Performed by Skilled Hackers

The reason threats like ransomware as a service are so deadly is that anyone with minimal cybersecurity can use them. However, the above hacks require a high level of expertise, with a deep understanding of how devices authenticate fingerprints and how to avoid them.

2. The Attacks Require the Attacker to Physically Interact With the Device

The hackers must have physical contact with the device to perform the above hacks. In the report, the hackers stated they might be able to create USB devices that can perform the attack once plugged in, but that means a potential attacker needs to plug something into your PC to hack it.

3. The Attacks Only Work on Specific Devices

You'll notice that each attack had to take a different path to achieve the same goal. Every device is unique, and a hack that works on one device may not work on another. As such, you shouldn't believe that Windows Hello has now been blown wide open on every device; it's just these three that failed.

While these hacks may sound scary, they'll be challenging to perform against actual targets. The hacker will likely have to steal the device to perform these hacks, which would undoubtedly alert the previous owner.

How to Stay Safe From Fingerprint Hacking

Windows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?

As stated above, the discovered hacks are complicated to perform and may require the hacker to remove the device to hack into it physically. As such, there's an extremely low chance that these attacks will personally target you.

However, if you're still not satisfied, there are some ways to protect yourself from fingerprint scanner hacks:

1. Do Not Leave Devices Unattended and Unprotected

Because a hacker will need to interact with your device physically, you should ensure it doesn't fall into the wrong hands. For computers, you can take steps to stop it from being stolen. If you're using a laptop, never leave it alone in a public space, and use an anti-theft laptop bag to stop people from tearing your bag open.

2. Use a Different Login Method

Windows Hello supports many different login methods, some more secure than others. If you've fallen out of love with fingerprint scans, check out if face, iris, fingerprint, PIN, or password logins are more secure, and choose one that suits you best.

If you're worried about these hacks, it's important to remember that there's a very low chance they'll target you specifically. As such, you should be safe using fingerprint scans; just don't allow people to steal your devices.

The above is the detailed content of Windows Hello Fingerprint Scanners Were Hacked: Should You Still Use Them?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to Change Default View in File Explorer (Windows 11)How to Change Default View in File Explorer (Windows 11)May 09, 2025 pm 02:02 PM

Customize Your Windows 11 File Explorer: A Guide to Setting and Saving Your Preferred View Tired of File Explorer's default view? This guide shows you how to easily change and permanently save your preferred folder view in Windows 11, whether it's l

Fedora 42 Joins the Windows Subsystem for LinuxFedora 42 Joins the Windows Subsystem for LinuxMay 09, 2025 am 03:01 AM

Pushing the boundaries of Linux: exploring unusual applications. Purely for fun, of course. Posts 7 Technically, you can create a WSL image for any compatible Linux distribution. However, officially supported images offer a significantly smoother e

How to Move a Window When You Can't Click on the Title BarHow to Move a Window When You Can't Click on the Title BarMay 09, 2025 am 01:03 AM

When applications unexpectedly extend beyond your screen's edges, accessing their title bars becomes impossible. This is especially common with dual monitors but can occur on single displays as well. This guide offers solutions for regaining control

This Limited-Edition 'Skeleton” HDD Shows You How It Writes BytesThis Limited-Edition 'Skeleton” HDD Shows You How It Writes BytesMay 08, 2025 pm 09:04 PM

The HD-SKL, a limited-edition hard drive, is a modern take on Buffalo's 1998 Skeleton Hard Disk. The original, a 4.3GB drive with a clear acrylic case, was produced in a limited run of 500 units. While Buffalo cites its 1978 Melco 3533 turntable as

The New Surface Pro Doesn't Feel ProThe New Surface Pro Doesn't Feel ProMay 08, 2025 am 06:01 AM

The new Surface Pro: A step back? Microsoft's latest Surface Pro offers connectivity via two USB-C ports, supporting charging, USB 3.2 data transfer, and DisplayPort 1.4a (up to two 4K monitors at 60Hz). However, the device ships without a power ad

Microsoft Challenges the MacBook Air With New Surface LaptopMicrosoft Challenges the MacBook Air With New Surface LaptopMay 08, 2025 am 03:02 AM

Microsoft's latest Surface Laptop aims to rival the MacBook Air, but with some notable compromises. The absence of a Surface Connect port marks a significant departure from previous models, reflecting the growing prevalence of Thunderbolt and USB do

Solve the problem that the svn plugin in eclipse always prompts for password inputSolve the problem that the svn plugin in eclipse always prompts for password inputMay 07, 2025 pm 05:03 PM

1. Background Recently, when using the svn plug-in to manage remote warehouse code in eclipse, prompts to enter passwords are always prompted to enter passwords, which is particularly annoying. After hard work, I finally solved the problem and shared it with you~ 2. Analysis of the password mechanism of the svn plug-in and the cause of the problem. When we use the svn plug-in for the first time and enter the password, a file that saves the password will be generated, and then the svn plug-in will read the username and password information by default every time. When eclipse is started, the configuration information will be automatically read into the program cache. After the password of svn is modified, it is impossible to log in again, and there is no prompt to re-enter the password. At this time, we can delete the relevant configuration files and let the svn plugin prompt us to re-enter the password. However, ec

How to restore the win8 system details stepsHow to restore the win8 system details stepsMay 07, 2025 pm 05:00 PM

The steps to start system restore in Windows 8 are: 1. Press the Windows key X to open the shortcut menu; 2. Select "Control Panel", enter "System and Security", and click "System"; 3. Select "System Protection", and click "System Restore"; 4. Enter the administrator password and select the restore point. When selecting the appropriate restore point, it is recommended to select the restore point before the problem occurs, or remember a specific date when the system is running well. During the system restore process, if you encounter "The system restore cannot be completed", you can try another restore point or use the "sfc/scannow" command to repair the system files. After restoring, you need to check the system operation status, reinstall or configure the software, and re-back up the data, and create new restore points regularly.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)