In this article:
In this article:
Are fingerprints more secure than a password? Not always. Here’s how hackers use stolen fingerprints to commit identity theft (and how to protect yourself).
In this article:
In this article:
We’ve all heard that our fingerprints are unique. No two people have the same pattern. So, it only makes sense that we would use them to secure our most sensitive accounts, devices, and information.
When you use your fingerprint to unlock your phone, you’re using what’s called biometric security. Unlike a password that can be hacked, given up in a phishing scam, or stolen and leaked to the Dark Web, biometric information is much harder to steal.
As far as types of identity theft go, fingerprint hacking is difficult to pull off. But it’s not impossible.
Hackers have found ways to bypass biometric authentication and even steal your fingerprints.
Once they do, they’re able to access your most sensitive and vulnerable information. This includes digital wallets and bank accounts, as well as your SSN, date of birth, and other data that can be used for identity fraud.
In this guide, we’ll cover how hackers steal fingerprints, what can happen if they’re stolen, and how you can keep your devices and accounts secure and safe.
{{show-toc}}
Fingerprint ID uses a fingerprint scanner to verify your print against the fingerprint image stored on file. It’s sort of like a key in a lock. If the key you put in doesn’t match the shape of the lock, it won’t open.
But unlike a key, your fingerprint is physically attached to your body. So you can’t accidentally lose it or have it stolen. Hackers can’t trick you into giving them up as easily as they can with passwords and other personally identifiable information (PII).
Here are a few other reasons why a fingerprint is a secure way to safeguard your accounts and devices:
Fingerprints aren’t the only physical attribute you can use for biometric identification. You can also use facial recognition, iris scans, and in some cases, physical behaviors — like how you move or talk.
But the uniqueness of biometric technology is also its downfall. You can always update a hacked password. But if someone steals your fingerprints, they’re potentially compromised forever.
No form of biometric authentication is entirely secure. If a hacker wants to steal your fingerprints, they have methods of getting them.
As long as a hacker has direct access to your fingerprints (either in person or from a data breach) and the right tools, they can duplicate your prints.
The good news is that the trouble of stealing your fingerprint data makes them a lower-value target than other sensitive data like your health care information, Social Security numbers, or bank account password.
It’s more likely that a hacker wants to target a specific individual to fulfill a very specific goal. For example, they may want to gain access to a specific device or building that uses a fingerprint scanner as a security measure.
So how do hackers “steal” your fingerprints? Here are the three methods they can use (and how to protect yourself):
If a hacker has access to your fingerprint data they can potentially create a copy and “spoof” biometric security systems.
The Kraken Security Labs team demonstrated how hackers can use a fingerprint photo to create a synthetic print. The only requirements for this technique are access to Photoshop, acetate paper, a laser printer, and wood glue. The kicker is that the team proved it only takes $5 to do this.
What’s more, a majority of fingerprint readers only read partial prints. This is why smartphones take multiple photos when you first enable fingerprint verification. So, a hacker doesn’t need a perfect, complete print to hack a fingerprint reader. A partial fingerprint will often do the trick.
How to protect yourself: Unless you wear gloves constantly, it’s pretty much impossible not to leave fingerprints out in the world. But the good news is that this technique is time-consuming and often difficult to replicate.
The hacker needs direct access to your prints, they can only target one individual at a time, and the prints have to be “clean” (i.e., undistorted).
💡 Related: How to Protect Yourself from Identity Theft (11 Steps) →
Data breaches are becoming more and more common, from the massive Equifax data breach to social media sites like Facebook and LinkedIn. But biometric databases can also be hacked and leaked.
In 2019, a major data breach at a security company used by banks, the police, and defense firms leaked the fingerprints and other biometric data of over a million people [*].
Like most data breaches, hackers don’t always need sophisticated cyber attacks like malware to bypass a company’s cybersecurity. Often, they only need to trick an employee into giving them access through phishing emails or other social engineering attacks.
How to protect yourself: Be cautious about who you share your biometric data with. It’s much safer to keep your fingerprints stored locally on a device (like your phone) rather than with an external biometric systems provider.
Unfortunately, this is getting harder to do as governments and smart cities start collecting more biometric data. For example, the Dubai airport uses a face scanning “tunnel” equipped with 80 cameras to scan departing passengers [*].
You can check to see if your information has been leaked to the Dark Web using Aura’s Dark Web scanner.
Hackers can also create fake fingers to fool more sophisticated fingerprint scanners.
In 2016, a researcher used a 3D printer to create a mold of a fingerprint as part of a police investigation [*]. After grafting it onto a prosthetic finger, his lab successfully used the recreated fingerprint to unlock a phone.
Although this method is expensive, it’s not unlikely that a motivated hacker with the right tools can achieve the same results.
How to protect yourself: Again, the only way to completely secure your fingerprints is to make sure no one has access to them. Store them locally and not with companies that could get hacked.
The short answer is, yes.
For most people, the greatest danger of fingerprint theft is identity fraud.
Stolen fingerprints can be used to access secure devices like your phone or laptop. Once a hacker is in, they can commit different types of fraud, including:
Hackers can also use stolen fingerprints to access secure offices and buildings and steal company data or physical items.
There are also luxury residences that use fingerprints to verify the identity of every person entering. Once a hacker is able to replicate your fingerprints, they can bypass any security systems that use your fingerprints as an identity verification tool.
💡 Related: Aura vs. LifeLock Comparison: 2023 Showdown →
Just because fingerprint-based ID can be hacked doesn’t mean it can’t make your devices and accounts more secure.
Here are a few ways to take advantage of biometrics to keep hackers out of your accounts:
Biometric authentication like fingerprint scanning, facial recognition, or retinal scans are only one of the three main types of identity verification that security experts suggest. The others include:
Most of us are used to using one of these types of identifiers (like a password or a fingerprint). For example, you unlock your iPhone or Android device with your fingerprints or by scanning your face.
But using multiple forms of identity verification (for example, a password and a fingerprint) makes accounts and devices much harder to hack.
This is what’s called two-factor or multi-factor authentication. Even if a hacker has access to your phone and gets past your PIN, it’s hard for them to bypass an additional step that requires your fingerprint or uses a special code that’s sent to your email.
💡 Related: Can iPhones Get Hacked? How To Tell & What To Do →
Your fingerprints and biometric data are only as safe as the location they’re stored in. If a company that’s storing your fingerprints or facial ID gets hacked or hit with a cyber attack, that information is likely to end up for sale on the Dark Web.
Whenever a company asks for biometric information, ask why they need it, how it will be stored, and how they protect it. It’s much safer to store this information locally. For example, Apple’s iPhone and computers keep your fingerprint info on the device, not a central server.
💡 Related: Scammed on Apple Pay? Here's How To Get Your Money Back →
Fingerprints and biometric information can be more secure than passwords and PINs in many cases. If you’re using your phone or laptop in public and type in your passcode, someone can shoulder surf and watch you enter it.
If you’re using a password instead of or in combination with your fingerprint, make sure you keep it private. Use a privacy screen on your phone or tablet so people can’t easily see what you’re typing.
💡 Related: The Top 10 LifeLock Competitors & Alternatives For 2022 →
It’s impossible to completely secure your devices and accounts from hackers. And if they get in, they can do serious damage to your financial accounts and identity.
An identity theft protection service monitors your accounts for signs of fraud and alerts you so you can shut down an identity thief.
For example, with Aura’s identity theft protection, you get:
Being a victim of biometric identity theft is not easy to deal with. Unfortunately, the most troubling part of having your fingerprints stolen is that, unlike a password, you can’t change them. Once your biometric data is stolen, it’s gone.
If you think you’re a victim of identity theft, here are some steps you can take:
The best way to protect yourself from identity theft is to learn to recognize the warning signs so you can act fast.
Keep track of your financial statements with diligence and make sure you review each line item in the statement. If you see suspicious activity, you should report the activity immediately.
Additional signs of identity theft include:
💡 Related: 14 Hidden Dangers of Identity Theft That Can Ruin Your Life →
If there’s even a little bit of doubt that you’re a victim of identity theft, go to your local law enforcement agency and file a police report immediately. In some cases, your local police station may recommend filing a report with the Federal Bureau of Investigation (FBI).
You should also file a report with the Federal Trade Commission (FTC) through IdentityTheft.gov. An FTC report is essential for disputing fraudulent charges. They’ll also help you set up a personalized recovery plan.
It’s critical that you review your credit report for fraudulent transactions after identity theft. You should also contact all three credit bureaus —TransUnion, Equifax, and Experian — so they can place a fraud alert on your credit report.
You can also freeze your credit to prevent others from opening accounts in your name, since a creditor won’t be able to access your credit file. Freezing, and unfreezing, your credit is free of charge.
📌 Use a credit monitoring service to automatically alert you of potential fraud. Aura monitors your accounts and credit report for any suspicious activity and alerts you 4X faster than the competition.
If your biometric information has been compromised, you need to rely on passwords and other security measures. Make sure all your accounts use long, complicated passwords that combine letters, numbers, symbols, and cases.
Fingerprint ID is convenient. But like all security measures, there’s no way for it to be 100% secure.
To keep your devices and accounts safe from hackers, consider signing up for Aura.
We’ll track and monitor all your most sensitive information, so you don’t have to worry that someone is stealing your identity.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.