Tuesday, April 22, 2025
HomeHacksHow Hackers Cracked into iPhone X Face ID with 3D Printing Mask

How Hackers Cracked into iPhone X Face ID with 3D Printing Mask

Published on

SIEM as a Service

Follow Us on Google News

The iPhone X Face ID which allows you to safely unlock your phone and the same can be used during app purchases also. AI with Face ID automatically adjusts to changes in your appearance in scenarios like wearing cosmetics and facials.

In the launch event, Apple claimed senior Vice President Phil Schiller claimed that Face ID capable of distinguishing human’s real face from masks through its Artificial intelligence.Below are the masks tested by Apple.

It draws an immediate attention among hackers that who is going to fool the iPhone Face ID first, on Friday a Vietnam based security company Bkav released blog and video demonstrating how they have beaten Face ID,

“They (Apple engineering teams) have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID. These are actual masks used by the engineering team to train the neural network to protect against them in Face ID. It’s incredible!”, Phil Schiller said
- Advertisement - Google News

They fooled the Face ID within a week of the iPhone X release which implies it is not an effective security measure.

Also Read: Hackers Using Legitimate Windows Tools for Hiding Malware and Evade the Detection

How the Hack occurred on iPhone X Face ID

They have created a mask with 3D printing and it with 2D images with some special arguments to fool the AI of Face ID.

Hack costs just 150 USD. they have used 3D printer and the nose part designed by handmade artist, then other parts with @D printing. Again the skin is handmade to trick the Apple’s AI.

It shows the recognition mechanism is not so strict seems to rely too much on Face ID’s AI.To their surprise, they have completed the hack within a half of the face.

Mr. Ngo Tuan Anh, Bkav’s Vice President of Cyber Security, said: “The mask is crafted by combining 3D printing with makeup and 2D images, besides some special processing on the cheeks and around the face, where there are large skin areas, to fool AI of Face ID”.

Before Bkav Wired magazine’s tried similar attempts but it failed, but Bkav researchers who have the deep understanding of Apple’s AI tricks to bypass it.

Potential Targets

Potential targets shall not be regular users, but billionaires, leaders of major corporations, national leaders and agents like FBI need to understand the Face ID’s issue.

Security units’ competitors, commercial rivals of corporations, and even nations might benefit from our PoC.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

Gain Legends International Suffers Security Breach – Customers Data Stolen

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed...

Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit

A major cyberattack has compromised more than 17,000 Fortinet devices globally, exploiting a sophisticated...