Concept explainers
Founded in April 1996, Antheus Tecnologia develops and distributes Automated Fingerprint Identification Systems [AFIS], automated fingerprinting, and other systems such as iris recognition devices. Antheus Tecnologia also claims that it is the first Brazilian company to be certified by the US Federal Bureau of Investigation [FBI] and develops biometric solutions for domestic and overseas clients.
In March 2020, the security research team at SafetyDetectives discovered a significant data leak in addition to other security flaws [such as lack of password protection] relating to fingerprint data on an Antheus log server in Brazil. The research team discovered almost 2.3 million data points in total and estimated that 76,000 unique fingerprints were found on the
The Antheus server investigated by the security team is an identity server, which means it gives users access to the system or the ability to register as a new user. It also had fingerprint information in at least two “indices” from a total of 91. The Antheus server stored server and API access logs but also contained fingerprint data comprising of Ridge Bifurcation and Ridge ending – essential components for identifying and verifying fingerprints. In addition to fingerprint information, there were also instances of biometric data vulnerabilities, such as face recognition data being accessible and retrievable from the database.
In parallel to the biometric data breach, Antheus Tecnologia also had another related vulnerability which was noticed during the investigation. The company provides services to a national Civil Identification System in Brazil used to issue driving licenses, although the access portal used for on-boarding new users was also not secure because of the lack of password protection. Furthermore, user data, administrator login information, several employee email addresses and phone numbers were also found.
According to the SafetyDetectives research team, the practice of allowing access to server data in such a way is rather unusual. This methodology generally leaves the server exposed, but this could have been done purposefully. If so, it’s a rather strange option to take when it comes to ensuring security.
SafetyDetectives security team found two indices, potentially referring to two different companies using the Antheus server to store personal information, including fingerprint data. Moreover, the investigation team found data logs relating to precise fingerprint scans that could be reconstructed from the index numbers stored on the Antheus server. Moreover, it could be possible to recreate [or reverse-engineer] a biometric image map for a particular fingerprint from strings of data found on the server. According to the research findings of the SafetyDetectives security team, nefarious users can access the Antheus server and, after extracting the available data, use the data stream of ones and zeros to recreate the full biometric image of someone's fingerprint.
[Source: https://www.safetydetectives.com/blog/antheus-leak-report/ Accessed May 2021]
- Q) Identify and discuss the vulnerability associated with fingerprint data stored on the Antheus Tecnologia server. Recommend a possible solution to patch this vulnerability.
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- What is the problem with biometrics as a security measure and what is the solution to help fix them?arrow_forwardEvaluate the security implications of mouse-based biometric authentication methods, such as mouse dynamics and fingerprint recognition.arrow_forwardSuppose you are working in the information security department and HR department of a Bank. What is the information security department of a bank? What is the HR department of the bank? what skills you will learn? What experience you will acquire from there? What you learn about the cystomers of the bankarrow_forward
- I need an explanation of which parts of this fingerprint would be marked in biometrics. This is AFIS related. If possible, circle the parts on the fingerprint you're explaining.arrow_forwardWhat is the role of biometric authentication methods like fingerprint recognition and facial recognition in mobile device security?arrow_forwardWhat would be the answers for the labquesarrow_forward
- "Analyze the technology behind biometric input devices, such as fingerprint scanners and facial recognition systems. How do they enhance security and authentication?"arrow_forwardWhat protections ought a firm to put in place to defend itself against the potential of being hacked or infected by a virus?arrow_forwardBiometrics has many benefits and drawbacks. What are the privacy issues that biometrics proponents should be concerned about? Are you either in agreement or disagreement with these concerns? Please tell me more.arrow_forward
- It would be interesting to look into a recent case where someone took advantage of a security hole in identification or access control. Such a study would be interesting because it would be about something happening right now. Does this mean that the company has to change how it does business? I was wondering if I could ask about the company's past of losses and, if I could, what those losses were.arrow_forwardInvestigating a recent authentication or access control security breach might be fascinating. Current investigations are exciting. Does this impact how the corporation operates? I wondered whether I may inquire about the firm's losses and what they were.arrow_forwardZero Trust has become one of cybersecurity’s latest buzzwords, but what does it mean? Read through this brief from PaloAlto Networks describing the latest cybersecurity strategy: Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture. Rooted in the principle of “never trust, always verify,” Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access control. Zero Trust was created by John Kindervag, during his tenure as a vice president and principal analyst for Forrester Research, based on the realization that traditional security models operate on the outdated assumption that everything inside an organization’s network should be trusted. Under this broken trust model, it is assumed that a user’s identity is not compromised and that all…arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education