December 29, 2017 By Douglas Bonderud 2 min read

The ideal data that cybercriminals target to compromise mobile devices is user personal identification numbers (PINs). While it’s tempting to consider these PINs secure — especially if they’re regularly changed and don’t occupy the “1111” or “1234” space — researchers from the Nanyang Technological University (NTU) in Singapore have discovered a shortfall in mobile application security: sensor data. Now it’s possible for what devices see, hear and feel to help cybercriminals gain total device access.

Listening In

As noted by Bleeping Computer, most modern mobile operating systems, including iOS and Android, don’t ask for user permission to collect sensor data. The result? Newly installed apps can easily access accelerometer, gyroscope, magnetometer, proximity sensor, barometer and ambient light data. Seems like a hodgepodge of useless information, right? Not quite.

Researchers created a custom Android app that included a sensor data-gathering algorithm. Once installed on test devices, the application gathered device tilt and ambient light data captured when users entered their PINs. Using that data, the algorithm then attempted to predict device PINs from a list of the 50 most common. The result was 99.5 percent accuracy on the first try. However, when using the list of all 10,000 possible four-digit PINs, success dropped to 83.7 percent over 20 tries.

This still marks a significant mobile application security risk. Using a combination of deep learning and agile methodology, the algorithm was able to assign specific weights to sensor data and improve accuracy over time by learning how different users enter their PINs.

PIN Pushback

As noted by the NTU research, current mobile application security makes it possible for attackers to leverage side-channel methods that subvert even strong device security. So how can users stay safe? Start with longer PINs, which increases the amount of data needed by the algorithm to successfully guess user passcodes. Dr. Shivam Bhasin of NTU suggested that, in addition to extra-long PINs, users should also leverage other security methods including two-factor authentication or biometric scans that can’t be subverted by sensor data collection.

Enhancing Mobile Application Security

Ideally, mobile device operating systems will begin regulating sensor permissions, either disabling access by default or giving users the ability to allow or block access on-demand. Given current the current security climate, however — such as the burgeoning Internet of Things (IoT) market, which values speed over security — users shouldn’t expect significant security changes in the near future.

The more likely scenario is grudging device-maker acknowledgment that sensor data could be an issue, coupled with dismissal of the test-app scenario as a viable real-world vector. But as evolving malware and network attacks demonstrate, cybercriminals often enjoy marked success by leveraging supposedly low-risk threat vectors such as air-gapped devices or SCADA systems. As a result, mobile sensor data could quickly roll up the attacker priority list.

Bottom line? Mobile application security has a blind spot. While per-app sensor control isn’t available (yet), users can reduce their risk with longer PINs and two-factor authentication.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Ransomware attack on Rhode Island health system exposes data of hundreds of thousands

3 min read - Rhode Island is grappling with the fallout of a significant ransomware attack that has compromised the personal information of hundreds of thousands of residents enrolled in the state’s health and social services programs. Officials confirmed the attack on the RIBridges system—the state’s central platform for benefits like Medicaid and SNAP—after hackers infiltrated the system on December 5, planting malicious software and threatening to release sensitive data unless a ransom is paid. Governor Dan McKee, addressing the media, called the attack…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today