Tuesday, March 4, 2025
HomeData BreachBiometric Security Platform Data Breach Leaked Millions of Users Facial Recognition &...

Biometric Security Platform Data Breach Leaked Millions of Users Facial Recognition & Fingerprinting Data

Published on

SIEM as a Service

Follow Us on Google News

Security researchers discovered the biggest data breach in Biometric Security Platform BioStar 2 that leaks millions of users facial recognition records, fingerprints, log data, and other personal information.

BioStar 2, a web-based biometric security smart lock platform by world’s biggest bio-access B2B company Suprema, and the platform used by UK Metropolitan police, defense contractors and banks, many local businesses and government networks.

Biostar 2 biometrics lock system deployed as a centralized system that offers user registration, real-time alarm, and door control in office builds and data warehouse.

In order to identify users, it also supporting facial recognition and fingerprinting technology to identify users.

The usage of Biostar 2 usage has been expanded since it was integrated into the AEOS access control system used by over 5,700 organizations in 83 countries.

A report published by security researchers from vpnmentor were able to access over 1 million fingerprint records, as well as facial recognition information.

Leaked data includes the personal information of employees and unencrypted usernames and passwords which is also highly sensitive in nature.

The team from vpnmentor was able to access over 27.8 million records, a total of 23 gigabytes of following data:

1. Access to client admin panels, dashboards, back end controls
2. Fingerprint data
3. Facial recognition information and images of users
4. Unencrypted usernames, passwords, and user IDs
5. Records of entry and exit to secure areas
6. Employee records including start dates
7. Employee security levels and clearances
8. Personal details, including employee home address and emails
9. Businesses’ employee structures and hierarchies
10. Mobile device and OS information

Biostar 2 platform has deployed over 1.5 million worldwide installations, and all of these could be vulnerable to this leak.

Facial recognition and fingerprint information are highly sensitive than any other data and once the data is stolen it cannot be changed, and it affects to rest of their life.

If these sensitive data take over by the cybercriminals, it will mishandle by them and leads to high risk for the organization and government networks, which allows to breach the companies network and take over the accounts.

“Hackers can change the fingerprints of existing accounts to their own and hijack a user account to access restricted areas undetected. Hackers and other criminals could potentially create libraries of fingerprints to be used any time they want to enter somewhere without being detected. “

Even it compromise the companies physical security and allow criminals to perform Robbery and steal valuable information, plant viruses, monitor and exploit systems.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...