Mobile phone motion sensors can be used to crack your PIN - Action News
Home WebMail Tuesday, November 26, 2024, 08:10 AM | Calgary | -16.5°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
Science

Mobile phone motion sensors can be used to crack your PIN

New research has revealed just how easy it is for criminals to use the sensors in mobile phones to crack four-digit PINs, and that users know very little about the risk.

New research reveals hackers can use sensor technology to gather all kinds of data

Research from Newcastle University in the U.K. has shown how malicious websites can use the motion sensors in mobile phones to uncover PINs and other information. (Rich Pedroncelli/Associated Press)

A new studyhas revealed just how easy it is for hackers to use the sensors in mobile devicesto crack four-digit PINs and to access a wide variety of other information about users.

Cyber-security experts from Newcastle University in the U.K. found that once a mobile user visitsa website, code embedded onthe page could then use the phone's motion and orientation sensors to correctly guess the users'PIN. This workedon the first attempt 75 per cent of the time, and by the third try 94 per cent of the time.

The study, published in the International Journal of Information Security this week, also found that most people have little idea of what the sensors in our phones can do and the security vulnerabilities they pose.

The researchers identified 25 different sensors that are now standard on most phones. Yetwebsites and apps only ask for permission to use a small fraction of these GPS and camera, for example.

Downside of fitness tracking

"A lot of these sensors came to help people have a better experience when they work with these devices, and they bring a lot of advantages to our lives," saidMaryan Mehrnezhad, a research fellow in Newcastle's school of computing science and lead author of the paper.

The sensors that enable popular fitness-tracking apps contribute to security risks. (Getty Images)

Examples of these include the accelerometer and gyroscope sensors that enablethe fitness-tracking apps so popular with cellphone users.

Yet the sensor technology is well ahead of any regulatory restrictions pertaining to our privacy,said Mehrnezhad in an interview with CBC News.

She and her colleagues mimicked what's known as a "side channel attack" on Android mobile phones using a websiteembedded with JavaScriptcode.

The results show that the attack site could learn details such as the timing of phone calls, whether the user isworking, sitting orrunning, as well as any touch activity, including PINs, she said.

Underestimating risk

The second part of the study evaluated people's understanding of these risks.

Interviews with around 100 mobile users found that most people are not aware of the sensors on their mobile devices, said Mehrnezhad, and that there is "significant disparity" between the actual risk and perceived risk of having a compromised PIN.

In fact, as the sensors were being developed, even the phone manufacturers didn't have a clear understanding of the risks associated with them, saidUrs Hengartner, an associateprofessor in computer science at the University of Waterloo.

"Everybody thought that accelerometer data and gyroscope data is not sensitive, so there's no need to ask for permission. Now researchshows that it is an issue," said Hengartner in an interview with CBC News.

"These are security researchers that figured this out, and so nobody else seems to have known, not the browser vendors, not the operating system vendors and definitely not the general public."

Solving the problem is "a big research challenge," he said, in part because users may not understand the implications of what they're being asked by an app or website and may simply default to saying yes.

Decision fatigue

Research has shown that when people get tired of being asked for permission, they default to saying yes so they can access the websitethey want to visit or use the app they need, said Hengartner.

Some browsers have begun asking for permissions for things like location data, but there is no uniform standard for doing so, he said.

As study authorMehrnezhadnotes, tech companies also don't want to sacrifice the convenience and functionality we've come to expect of our mobile devices.

"It's a battle between security andprivacy on one hand and usability issues on the other hand," she said and it's only going to get more important.

"Sensors are going to be everywhere. The problem will get more serious when smart kitchens, smart homes and smart cities are connected via the internet of things," she said.

Preventive measures

Itsounds obvious, but the first stepusers shouldtake to protect themselves is to choose more complex passcodes. Previous research has found that 27 per cent of all possible four-digit PINsbelong to a set of 20 that include dead-easy combinations such as "1111" or "1234," said Mehrnezhad.

"I know people hate it because it's not convenient," she said, but it's also critical to change your passwords regularly.

In addition, keep your operating systems up to date, only download apps from trusted sources like Google Play or the App Store, delete apps you're not using, and close both apps and browser tabs when you're done using them, she said.