April 12, 2017 by

Researchers Reveal Passcode Exploit through Phone Motion Sensors

Last year, a team of cyber researchers demonstrated the simplicity of spying on a phone’s motion sensors to steal the user’s PINs and passwords.

A team of cyber researchers from Newcastle University in the United Kingdom have demonstrated that a phone’s PINs and passwords can be exploited by simply analyzing the way the phone tilts as the passcode is typed. The distinct patterns used in the phone were enough for the researchers to crack four-digit PINs on the first guess at 70% of the time and a sweeping 100% of the PINs used by the fifth guess.

“Most smart phones, tablets, and other wearables are now equipped with a multitude of sensors, from the well-known GPS, camera and microphone to instruments such as the gyroscope, proximity, NFC, and rotation sensors and accelerometer.” explains Dr. Maryam Mehrenzhad, lead author of the published paper and a Research Fellow at the University’s School of Computing Science.

Notably, he added:

But because mobile apps and websites don’t need to ask permission to access most of them, malicious programs can covertly ‘listen in’ on your sensor data and use it to discover a wide range of sensitive information about you such as phone call timing, physical activities and even your touch actions, PINs and passwords.

During the course of their research, the academic team identified 25 different sensors, which are standard on most devices, give information about the device and its user – essentially enabling access to details without the user’s permission. Only a select number of these sensors, such as the camera and GPS, actively seek the user’s permission to access the device.

A number of other giveaway actions, such as clicking, holding, tapping, and scrolling, induce a motion trace with a unique orientation. If a malicious webpage or app had access to these sensors, the user’s activity can be spied upon.

Google and Apple and other major browser providers have all been notified of the exploit, but nobody has come up with a concrete answer.

As such, Mozilla and Apple have partially fixed the problem for Firefox and Safari respectively. The research team is working with the industry for a final solution.

Image credit: Pexels.

About the author

Image of Author

LIFARS is a digital forensics and cybersecurity intelligence firm based in New York City. LIFARS is ranked as one of the top Digital Forensics and Cyber Investigations companies in 2016 and as one of the top cybersecurity companies in the New York metropolitan area for 2015 on the Cybersecurity 500 – a directory of the hottest and most innovative companies to watch in the cybersecurity industry.

Related articles

MacOS Zero-Day Flaw Exposes Passwords in Plaintext

A critical flaw in the newly-released version of macOS, High Sierra, allows rogue applications to...

Read more arrow_forward

First Ever ‘Major Scale’ Mac Malware Hits Users with Phishing Campaign

Security researchers have discovered a new malware program that targets macOS users and is capable...

Read more arrow_forward

Mac Malware Rises as Ransomware Extortionists Target Apple Users

A survey by security software firm Malwarebytes’ analysis of malware and cybercrime in the first...

Read more arrow_forward