Thursday, February 22, 2024

Nokia 9 PureView Fingerprint Sensor Is Fooled by Chewing Gum

The brand new Nokia flagship with five camera modules looks pretty promising but has several significant weaknesses. Recently, it shocked the world with dangerous security flaw related to its onscreen fingerprint sensor that is tricked by non-registered patterns of other fingers and even various items such as coins or gloves.

Users noticed the first issue right after the launch. Then, Nokia’s scanner had too low sensitivity and didn’t recognize the owners’ fingerprints often.

HMD Global responded to this problem with a patch dated by 19 April. The update improved the scanner’s sensitivity and really helped people to interact with their smartphones. Too much.

As for now, the PureView has an extremely responsive sensor that recognizes not only fingerprints of owners but also other prints and material objects, e.g. chewing gum packs, coins, gloves, etc.

The problem was spotted by Twitter user Decoded Pixel. He posted a video where his Nokia 9 is unlocked with two different fingers and chewing gum

Why This Happened?

The most recent update for Android 9 Pie 4.22 includes the patch from HMD Global. Most likely, engineers didn’t improve the recognition algorithm but simply lowered the sensitivity threshold so PureView now accepts prints with a quite low original match. Phone owners mention that they can unlock the gadget with almost any touch, including random taps and fingers wrapped in cloth. Developers still didn’t react to multiple complaints.

As usual, people also joke about the issue. Reddit users mention that this is a new Nokia feature that will be available for extra money – the Gum ID. Still, we shouldn’t forget about the real danger of such flaws as frauds can easily get access to stolen phones due to identification errors. The next OTA update should fix the sensor so it’s better to disable this feature now and use traditional PIN codes or graphic patterns. As well, you can order dedicated software development Ukraine here to get extra security layers for your applications.


Latest articles

Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens

An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as...

US to Pay $15M for Info About Lockbit Ransomware Operator Data

In a significant move against cybercrime, the U.S. government has announced a bounty of...

Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware

Threat actors abuse Google Drive for several malicious activities due to its widespread use,...

Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000

In a startling incident underscoring the growing menace of cybercrime, a woman's Swiggy account...

Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts

A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged....

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

Google has recently unveiled Chrome 122, a significant milestone for the widely used web...

New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack

Researchers have discovered that threat actors have been using open-source platforms and codes for...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles