Friday, April 19, 2024

How Hackers Cracked into iPhone X Face ID with 3D Printing Mask

The iPhone X Face ID which allows you to safely unlock your phone and the same can be used during app purchases also. AI with Face ID automatically adjusts to changes in your appearance in scenarios like wearing cosmetics and facials.

In the launch event, Apple claimed senior Vice President Phil Schiller claimed that Face ID capable of distinguishing human’s real face from masks through its Artificial intelligence.Below are the masks tested by Apple.

It draws an immediate attention among hackers that who is going to fool the iPhone Face ID first, on Friday a Vietnam based security company Bkav released blog and video demonstrating how they have beaten Face ID,

“They (Apple engineering teams) have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID. These are actual masks used by the engineering team to train the neural network to protect against them in Face ID. It’s incredible!”, Phil Schiller said

They fooled the Face ID within a week of the iPhone X release which implies it is not an effective security measure.

Also Read: Hackers Using Legitimate Windows Tools for Hiding Malware and Evade the Detection

How the Hack occurred on iPhone X Face ID

They have created a mask with 3D printing and it with 2D images with some special arguments to fool the AI of Face ID.

Hack costs just 150 USD. they have used 3D printer and the nose part designed by handmade artist, then other parts with @D printing. Again the skin is handmade to trick the Apple’s AI.

It shows the recognition mechanism is not so strict seems to rely too much on Face ID’s AI.To their surprise, they have completed the hack within a half of the face.

Mr. Ngo Tuan Anh, Bkav’s Vice President of Cyber Security, said: “The mask is crafted by combining 3D printing with makeup and 2D images, besides some special processing on the cheeks and around the face, where there are large skin areas, to fool AI of Face ID”.

Before Bkav Wired magazine’s tried similar attempts but it failed, but Bkav researchers who have the deep understanding of Apple’s AI tricks to bypass it.

Potential Targets

Potential targets shall not be regular users, but billionaires, leaders of major corporations, national leaders and agents like FBI need to understand the Face ID’s issue.

Security units’ competitors, commercial rivals of corporations, and even nations might benefit from our PoC.

Website

Latest articles

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale...

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because they have...

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS,...

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is...

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...

Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.This groundbreaking...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles