5 ways hackers can bypass your fingerprint scanner and how to protect yourself

The fingerprint sensors were present for some time, and it became a standard feature in most smartphones. Apple has introduced the IPHONE 5S touch ID in 2013. Since then, it has appeared on 12 main models for iPhone (and some iPad also).
Although Apple removed it from most phones after iPhone 8, it is still present in the iPhone SE series. On the other side Android phone On the market has a fingerprint scanner. But are optical fingerprints impossible to overcome? Frank asked Dirton, Michigan, a similar question that I want to highlight and treat because it helps us all:
“Can the website be hacked/penetrated with the password and protect the fingerprints (multiple verification)?”
Get what you say, Frank. You thought that the fingerprint scanner literally requires a fingerprint, it cannot be overcome. But you will be wrong. Although fingerprint scanners are generally more secure than face recognition and passwords, they are not guaranteed. In fact, there are several methods that bad actors can overcome to steal your identity.
A smartphone on a table (Cyberguy “Knutsson)
5 methods that are bad actors bypassing lights fingerprints
There are multiple methods that infiltrators use to bypass the fingerprints. Below, I will discuss five of the most prominent methods.
1.
The infiltrators take advantage of the concept of “MasterPrints”, which are designed fingerprints to match multiple individuals’ prints. Researchers in New York University developed “Deepmasterprints” Using machine learning to create artificial fingerprints, the sensors can be deceived by simulating common fingerprint features. These artificial prints can match a large percentage of stored fingerprints, especially on devices with less coincidence Security settings.
2. Fake fingerprints using 3D printing
Another trick that infiltrators use is making fake fingerprints. They can raise the publications of the things they touched and then use things like cloth glue or even 3D printers to make molds. For example, Research at Cisco Talos Try a range of different ways to do this using 3D printing and testing them on phones like iPhone 8 and Samsung S10; PCs such as Samsung Note 9, Lenovo Yoga and HP Pavilion X360; Even smart tools such as lock.
On average, fake fingerprints worked about 80 % of the time. They were able to deceive the sensors at least once. Interestingly, they were unable to break the biometric systems on Windows 10, but they indicated that this does not necessarily mean that they are safer. This means only that this particular method does not work on it.
19 billion online leakage passwords: How to protect yourself
3. Brevish power attacks via BrutePrint
The attackers found a cheap way to storm smartphones by authenticating the brute -power fingerprints. The method, called BRUTEPRINT, allows the attackers to circumvent the usual limits that stop many failed fingerprint attempts. It works by taking advantage of unknown defects in the fingerprint system. These defects, named after “CAMF” and face the match (MAL), is found due to poor protection of fingerprint data on a portion of the devices called the Serial Ocean TV (SPI).
Basically, BRUTEPRINT uses an attack on the center’s devices to kidnap fingerprint data. He sits between the fingerprint sensor and the safe area of the phone (called the reliable implementation environment) and tries the largest possible number of fingerprint images until he finds a match. The comfortable part is that the attacker needs physical access to the phone in order to work this method.
4. Side channel attacks with the print menu
PRINTLISTER is an attack by a side channel that picks up the sound of the finger on a screen to extract fingerprint features. It may seem to be something from the science fiction movie, but researchers have already built evidence of the concept. By analyzing friction sounds, attackers can rebuild fingerprint patterns, which may enhance the effectiveness of MasterPrint attacks.
5. Exploiting the storage of unsatched fingerprint data
Some devices store fingerprint data without sufficient encryption. If attackers can access this unprotected data, they can repeat the fingerprints to overcome the approval. For example, in 2024, a server that has been misincompted by approximately 500 GB of sensitive biometric data, including fingerprints, face survey and personal details of law enforcement applicants.

A smartphone image (Cyberguy “Knutsson)
The best 20 applications that follow you every day
So, can you trust fingerprint lights?
Fixed fingerprints make it easy and somewhat safe to open your devices. Since everyone has unique fingerprints, you do not need to remember the complex passwords. Just a quick touch and you are in it. Most modern devices store fingerprint data in safe parts of the system, and use things like LIFY discovery to ensure that someone is not trying to deceive the scanner with a fake finger.
However, there is no perfect security method. The skilled attackers have found ways to bypass fingerprint scanners using high -resolution images or 3D printed fingers or by taking advantage of defects in how the scanner communicates with the rest of the device. The risk is really dependent on the quality of the scanner design and the amount of the voltage that someone has made to break. For most people, the fingerprint authentication is fast, easy and safe enough. However, if you are dealing with very sensitive information, only dependence on biological measurements may not be the best idea.
How to remove your personal information from people’s search sites

A person uses a fingerprint for safety verification purposes (Cyberguy “Knutsson)
10 simple steps to improve your smartphone safety and its specialization
6 ways to protect your fingerprint data
Protect your biometric identity with these basic security measures.
1. Choose the brands for reliable phones: If you are buying a phone, stick to the well -known brands Like applesSamsung or Google. These companies take additional steps to protect fingerprint data by storing them in safe areas of the phone that is difficult to access. The brands may not have cheaper or less popular brands, making it easier for the attackers to steal your data.
2. Keep your phone update: Phone updates Not only about new features. They have safety problems that infiltrators may use to break your device. If your phone is asked to install update, do so. Most phones also allow you to run automatic updates, so you don’t have to worry about remembering. Keep updating your program is one of the easiest and most important ways to stay protected.
3. Use the strong antivirus program: Install the strong anti -virus program to detect harmful programs that may display biometric data storage. Strong Antivirus provides the detection of the actual threat and anti -fishing and privacy features to prevent unauthorized access to fingerprint data. The best way to protect yourself from malicious links that prove harmful programs, which may reach your own information, is to install a strong antivirus program on all your devices. This protection can also be alerted to relieving emails and fraud on Ransomwari, and maintaining your personal information and digital assets. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.
What is artificial intelligence (AI)?
4. Do not only depend on fingerprints: Using a fingerprint to cancel your phone lock is comfortable, but it should not be your only defense line, especially for sensitive applications such as banking or email services. Always prepare a personal identification number, password or style as a backup on iphone and Android. In this way, even if someone can copy a fingerprint, they still need other information to enter.
5. Be careful about those who deal with your phone: If another person uses your phone, especially a stranger or someone you don’t know well, he may be able to copy fingerprints from the screen. It is rare, but it happens. To reduce this danger, avoid delivering your phone to people unnecessarily and wipe your screen from time to time to remove any clear imprints.
6. Just use fingerprint login with reliable applications: Not every application asks for a confident imprint. It is safer to use login to fingerprints only with applications from well -known and reliable companies, such as your factory, phone manufacturer, or email provider. If an unfamiliar application requests access to fingerprints, it is best to overcome it and use your password instead.
7. Think of using the personal data removal service: Scrap scanners can be exceeded even fingerprints, and large amounts of personal and biometric data have been exposed to violations. Using a personal data removal service helps reduce your risk by removing your sensitive information from public databases and data mediation sites, which makes it difficult for infiltrators to collect details that can be used to steal your identity. Check the best data removal choices here.
Get on Free examination To see if your personal information has already came out on the web.
What the infiltrators can learn about from the data broker file
Court Kisa Curt
Passwords are generally easier than penetration than biometric data such as fingerprints or face recognition. However, the main difference is that passwords can be changed if they are at risk. Biological measurements cannot. Most modern devices provide both options, and biological measurements can provide an additional layer of safety by making it difficult for someone else to access your phone or applications. It is also fast and comfortable, because you don’t need to remember anything or write anything. However, in most cases, your device still retracts a password or pin when the biological definition does not work, so both systems often walk side by side.
Click here to get the Fox News app
With an increase in development of ways to overcome fingerprints, what should companies do to stay at the top of these threats and protect user data better? Let’s know through our writing in Cyberguy.com/contact
For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter
Ask Kurt a question or tell us about the stories you want to cover
Follow Court on his social channels
Answers to the most asked Cyberguy questions:
New from Court:
Copyright 2025 Cyberguy.com. All rights reserved.