
The Samsung Galaxy S8 claims that its iris recognition technology provides “airtight security”, but the Chaos Computer Club knows better and shows how it can be easily bypassed. Australian researchers create a wearable gizmo that authenticates you through your walk, but is it ever going to be practical? Mac malware reportedly wastes no time stealing information from a software developer. And the boss of the Bank of England is smart enough not to fall for an email prankster.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by special guest Paul “Duck” Ducklin.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Visit demos.launchkey.com for your free demonstration. And thanks to Iovation for supporting the show.
Smashing Security Episode 22: Walk This Way to Defeat Biometrics with Carole Theriault.
Are you all right?
We were to be presenting today at an event which very sadly was cancelled for reasons that anyone in the UK will probably understand because we were going to have the event at the Man U football stadium.
So they've sort of put that into lockdown.
Instead, we're going to be talking about computer security.
And as always, we've chosen a few stories, what's been going on in the news, things which have caught our eye in the last week or so.
And I wanted to start it off with some stories of bizarre biometrics. First of all, we've seen those chaps at the Chaos Computer Club up to their old shenanigans once again.
And they have released a video of themselves bypassing the iris scanner in the Samsung Galaxy S8.
And if you read the marketing material, it says the iris recognition, you know, is airtight security, allows consumers to finally trust that their phones are protected.
Quack, quack. As you probably guessed, that's not the case.
They printed it out and they put a contact lens over the iris to imitate the curving of the eye. And that's all that was required. You know, it's really fairly basic.
All you needed was a digital camera, a decent laser printer— ironically, apparently Samsung printers provided the best results of all— and a contact lens, and they were able to unlock the phone.
You take a photo of the fingerprint and then use it to generate, you know, a simulacrum of the original fingerprint.
And it doesn't really surprise me that you're relying on a photo of your iris taken by the camera in your phone.
So it doesn't beg belief that an image taken with a camera of similar quality can produce the resolution required to fool the—
A retina scan is the old-school way of doing it, where you have to put your eye right up against something that shines a light in, and it takes a picture of the blood vessels at the back of your eye.
That never caught on because obviously you have to keep sticking your eye up against something. So imagine at an ATM if the previous guy had conjunctivitis. Yes, but so did you.
So it was, it kind of felt a little bit weird and intrusive, like peering into this device. So the iris, it's actually the pattern in the colored bit of your eye.
Now, let's assume that that is unique for you.
I mean, that, you know, and it's super unique and the way that the images get processed and the algorithm used kind of generates this unique, well, fingerprint or checksum for your iris.
That can all still be true.
And in fact, in a way, the more likely it is that your iris is unique, the more likely it is, I suppose, that the copy of your iris won't clash with anybody else's.
And so it's not surprising. The weak part is that it relies on essentially a photo that's captured by the phone.
It says you can finally trust your phones are protected. And I'm thinking, well, I'd rather have a PIN or a decent password on it.
I am sure someone inside came up and said this could be done, and they probably— I mean, they must have known this was a possibility if you're doing this and you're building a kind of security iris scanner.
You'd be thinking, exactly, what happens if I've got a decent printer? And in this case, they've combined it with a contact lens as well, in order to unlock the thing.
So it wouldn't be surprising, but I guess these things are still being developed because they're cool.
And they're the kind of things you want to show off to your friends, say, hey, look, I can just look at my phone and it unlocks.
Then sort of somehow, and something which— a magnifier as well. Maybe then you could get— I'm getting a little bit carried away, aren't I?
So first of all, we've decided, all right, so we're probably not going to use our irises because it turns out that's no good at all, despite what some are telling you.
Okay.
So they got some devices which had already been linked to particular people with particular walks, and then they asked people, can you try and mimic their walk to see if you can get into the device?
And apparently some people managed it 13 times out of 100. So 13% of the time they were able to bypass the authentication method by sort of mimicking the walk-in.
You know, now clearly that's not good enough, right? They're going to have to keep on refining this technology if they're going to be serious about rolling it out.
But it suggests that the developers are on the right path.
So you can tell the way someone opens the gate whether it's friend or foe.
But actually, when you said it meant gait as in G-A-I-T, I was figuring, I wonder how you extract that information, because all I've read about gait recognition before, as far as I know, is related to video, where you actually look at it, and I suppose you digitize how the points move like you would for animation software and so forth.
I was wondering how they do that when it's measured. It's a thing that you carry that you measure. I'm doing power generation.
I don't know whether you have to wear something that straps on either side of your knee or something. It seems like an interesting way to do it.
But I just wonder how much significance there is in that data. Do you get an 8-bit checksum or a 32-bit? Or how much do you get out that allows you to kind of milk it?
Although a lot of people, of course, try and take off that walk. There's the Bangles who used to walk like Egyptians. You know, there are some unusual ones.
It's like, phone remains unlocked, phone remains unlocked because you can't generate the password anymore.
I have a phone I carry, a little Mars Bar phone that I carry mainly as an alarm clock and just because it only weighs 60 grams and I don't have a SIM in it and you can always make emergency calls on that.
So I guess they've thought of that bit.
They work out that on Saturday nights you tend to get the high heels on or something, or you go jogging or whatever it is that you might do.
And then when you actually, for super important things, like when you actually want to pay money out of your bank account, then you do a quick jog.
It's a follow-on from I think we spoke about this last time I was on about the HandBrake app for Macs, where the HandBrake server that stored this video transcoding app, one of the servers actually got hacked.
And the crooks, instead of going in and trying to steal videos or encrypt all the guy's files, they actually poisoned the download DMG file for the Mac so that when you installed it, you still got the regular app, but you've got some secret sauce alongside it.
That almost immediately went after your keychain, which is the Mac's built-in password manager, if you like, and the browsing and web data history cache for four different browsers that it knew about: Opera, Firefox, Chrome, and Safari, as far as I recall.
And it immediately uploaded those to the crooks.
And it turned out— now, it was only up for a few days, and only people who downloaded from this one of the two servers and did an install rather than update actually got infected.
So it wasn't enormously successful in terms of its penetration. So there's no sort of WannaCry panic here.
But I use the word panic because the guy behind a company called Panic Inc., they make FTP and SSH apps and they have a thing called Panic Sync, which is a background cloud data storage service.
He actually got infected by this because he happened to install it at the wrong time. And as he said, I feel like a monumental idiot for having fallen for this. But do read my story.
What happened afterwards is almost immediately he noticed that there were alien logins to his Git account accessing his source code.
Now, we can't prove that they're related, but there's kind of a strong post hoc ergo propter hoc going on here. And what was amazing is just the speed with which this happened.
And you imagine that the reason for that is it's all automated by the crooks.
Up goes his web browsing history, up goes some kind of Git authentication token, and in go the crooks right away to have a sniffle around and grab his stuff.
So he didn't lose any data like you would in a WannaCry infection. In fact, he still had his stuff, but the crooks had it too, and they had it almost instantly.
Although both of those things could clearly happen.
But in many cases, it does look as though this is— there's a kind of industrialized cybercrime machinery behind this sort of malware.
Grab your credentials as soon as you've got them, particularly say if it's a login token, it's only going to be valid for a little while.
So go in right away and just see what you can get because everything's got that bit of value to the crooks these days.
And so maybe again, it's no surprise that these things are becoming so automated in their exfiltration of data.
So our message to Mac users is don't think that criminals are turning a blind eye to you.
Although most of the malware we see is written for Windows and then maybe Android, Mac users are being targeted as well. You should be running security software.
You should be following best practices to keep your systems defended and protect your data because you could be next. Oh, how about this?
It looks like a sponsor slot has just popped up, and it is my pleasure to thank Iovation for sponsoring this episode of Smashing Security.
Iovation is a company that creates authentication and fraud prevention solutions, helping to secure businesses while making it simple for users to log into their favorite apps and services.
And they have a new mobile multifactor solution called LaunchKey that can be built into your mobile apps, websites, and online services, providing a simple, streamlined remote login function.
It promises a path to a passwordless future and provides a way to stop storing user credentials, meaning you won't have to live in constant fear of your users' details being hacked and the consequent damage to your brand.
You can even white label Iovation's LaunchKey to fit in with your brand. Now the great news is this: Smashing Security listeners can benefit from a free demo of LaunchKey.
Just visit demos.launchkey.com to try it out. And thanks very much to Iovation for supporting the show. Doug, it's always a pleasure having you on.
Carole, take us— what have you got for us?
So he was duped in an email prank, and I wanted to talk about it for two reasons. One, to talk about email security and watching out for pranksters like this.
But also, he came out looking quite not bad out of this, I think, and I want to get your opinion on that. Okay, so here's what happened. So Mr. Carney receives an email from Mr.
Habgood. Now, he happens to be the court of the Bank of England, and he gets it from his personal email address, . Now, turns out, of course, that's not Mr.
Habgood's email address, and it was a prankster that was using it, and he started an email exchange with Mark Carney. Now, it was quite interesting reading the thread.
The thread's been, of course, all published now on Twitter. And the thread opens up referencing Jane Austen because she's going to be on the new £10 note.
And there's conversation about it because apparently they've prettified her for the bill.
So there's a few articles out there showing this is what she really looked like and this is how she's been prettified.
And this is how Anthony Hapgood, the email prankster, started the conversation, saying—
It's kind of an issue. And so it's quite a cunning choice.
So even if Mark Carney might have gone, I've never received an email from his home address before, the first opening line kind of talking about Jane Austen's face but not saying that— so what he writes is, apparently her face resembles that of someone who had a bracing martini.
You know, I prefer Scotch myself. So it has a kind of tone of camaraderie and authority.
And so anyway, Mark Carney fell for it and responded back, but just said that he'd have a few martinis.
So there's nothing, you know, it makes reference to Eddie George, who was the Bank of England head, what, in the '80s, '90s? Yeah.
Anyway, so the conversation goes on, and then the prankster, who's pretending to be Anthony Hapgood, starts saying, "Can you come to a party?" He says, "You'll have very pretty ladies there." And he'll keep the glasses low down, so that you can kind of see their enchanting dexterity.
And Carney basically closes down the conversation right there and then.
I mean, is that— I suppose you're not trying to obtain money by deception or anything, so I presume it's not a criminal offense.
He's also done this to the CEO of Barclays, or the president of Barclays, a few weeks ago. So he's calling himself email prankster.
So it's a self— he's self-titled himself that, and then the press have grabbed onto that title.
And he's using the excuses, look, I'm trying to tighten security because if I can get into the Bank of England and make the head of Bank of England look like an idiot, then shouldn't we look at this?
So some people are arguing this is a good idea. What do you think?
But I just think if email security needs to be tested, shouldn't it be done with the permission of the organization itself rather than—
That's kind of uncovering an exploit.
That's a little bit different from then taking that exploit and using it against someone so you can say, "Ha ha ha." I think there is a difference between the two.
And I suspect people are going to start thinking about internal pen testing and looking at phishing simulations, right, and trying to just test, get their employees up to scratch on that, to be aware of these things.
You know, you get enough spam and nuisance messages.
He smelled, you know, he wasn't going to respond, probably figured that's not how my colleague would talk anyway.
And then you imagine— and what doesn't get shown in the so-called prankster stuff is behind the scenes— you'd imagine that they would have contacted each other and IT Security and said, hey, someone's trying to— someone's trying to impersonate you.
I saw it as, you know, he's sitting there, you know, remember Terminator 2 when Linda comes around the corner and she sees Arnold Schwarzenegger coming towards her and she kind of slides across the floor pushing herself back?
That's what I imagine Carney did when he realised, going, oh God, I've been duped.
Then it kind of, you could pitch that as though, well, obviously, that's how this chap behaves in real life. Otherwise, everybody would have closed off the correspondence sooner.
So, every time an email goes outside the company or outside the network, there's a kind of pop-up.
Now, part of me kind of thinks I was just going to say, yes, I know it's going outside because I know it's, you know, home address. Yes, I think people just need to be more wary.
So, and this is probably going to become more popular, and this is the problem with this, is it's making it popular because he's getting press for it.
Because Jane Austen today, if she had a bad photograph taken from— if she was on a night out, right, you know, enjoying herself with the Brontës or something like that, you know, and someone took a photograph and she thought, "Oh dear, I look a bit bad in that photo.
Do you mind deleting it, or can you take that off Facebook?" It would have just happened.
As it is, we've got this one-line drawing of Jane Austen which is being used over and over again for us to work out what she looked like.
It could have been drawn by some completely incompetent artist who didn't capture her true beauty, and forevermore now we're thinking, "Oh, that picture of Jane Austen on the banknote, that can't be accurate.
She's far too attractive. She needs to look like this minger instead." I think it's a bit unfair on lovely Jane Austen.
We greatly appreciate you being here. Thank you.
And if you would subscribe, then you will get every episode as it comes out.
You won't miss one in future, and you might even want to leave us a review on iTunes because it makes a big difference and means more people get to hear about the show.
Thanks for tuning in. If you like the show, tell your friends, let us know what you think.
Go to www.smashingsecurity.com and you'll find our email contact form, links to our Twitter and places like that. And until next time, toodle-oo!
Show notes:
- Chaos Computer Clubs breaks iris recognition system of the Samsung Galaxy S8 – Chaos Computer Club.
- Breaking the iris scanner locking Samsung’s Galaxy S8 is laughably easy – Ars Technica.
- New technology uses the way you walk as a password – CNet.
- Hofmeister – follow the bear TV advert – YouTube.
- Monty Python’s Flying Circus’s Ministry of Silly Walks sketch – YouTube.
- Source Code for Several Panic Apps Stolen via HandBrake Malware Attack – MacRumors.
- Bank of England accused of airbrushing Jane Austen on the new £10 note – Liverpool Echo.
- Bank of England governor falls for email prank but maintains his composure – The Guardian.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Paul Ducklin – @duckblog
Thanks to our sponsor:
This episode of Smashing Security is made possible by the generous support of Iovation.
iovation is offering Smashing Security listeners a free demonstration of its mobile multifactor solution product, LaunchKey, which can be built into your mobile apps, websites and online services to provide a simple, streamlined remote login function.
Visit demos.launchkey.com, and thanks to iovation for their support.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.
Remember: Subscribe on iTunes or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Paul Ducklin is wrong when he says he can still make emergency calls from a SIM-less telephone. He's unknowingly perpetrating an internet hoax.
OFCOM specifically prohibit the making of 999/112 calls from mobile handsets without a SIM because of the difficulties in immediately barring repeated hoax callers.
Therefore you *must* have a SIM in your handset in order to make a 999/112 call.
Proof; if anybody needs it:
"Consumers must also ensure that the mobile handset from which they wish to make the emergency call contains a SIM card."* Paragraph 11.6
They don't explain the rationale behind blocking SIM-less calls in this document but I can confirm that calls to 999/112 *do not* connect if no SIM card is present.
*https://www.ofcom.org.uk/__data/assets/pdf_file/0016/43063/ai_statement.pdf
I wasn't aware of that – I have been outside the UK for many years until recently. AFAIK that SIMless emergency call restriction doesn't apply in every country – I am pretty sure that the place where I bought the phone doesn't have such a limitation. Fortunately, I have had to make an emergency call only once in recent memory (to report a bush fire that turned out to be controlled burning, but thanks for your call anyway, Sir) and I had a SIM in the phone at the time, so I do accept I don't have any evidence either way on the issue. So I will take your word for it.
Sad comment on UK society that OFCOM felt the need to react that way, isn't it?
(I'd be inclined to block the IMEI to suppress hoaxers of this sort, considering that in the UK you don't need ID to buy a SIM, and you can buy new SIMs much more easily than new handsets. As an aside, given current moods about surveillance, how long do you reckon before you'll need proof of identity, maybe even proof of address, to activate a new SIM in the UK?)
Thanks for replying. I wasn't sure if you were UK-based and I did notice on your Twitter that you're down under.
It's complicated how it started. Originally you couldn't use it SIM-less, then you could and now you can't.
OFCOM stopped it after a substantial increase in hoax calls to 999. It is possible to block the handset by the IMEI but that can be easily changed although doing so is a criminal offence.
Normally the exchange operator, who answers the 999 call, transfers the call to the relevant emergency service (fire, police, ambulance, coastguard, mountain rescue) and they relay the CLI to the emergency service orally. Nowadays CLI details are relayed electronically along with name and address and a precise/approximate location.
To bar a SIM is trivial for the emergency services but to bar an IMEI is much more difficult because there's no single UK registry of IMEI numbers (apart from lost or stolen) which can be used to prevent calls from being made.
Imagine if a high-profile VIP somehow had their IMEI captured using a stingray and a number of hoax 999 calls made by a miscreant using that same IMEI – spoofed on another handset. The emergency services would bar that IMEI. Then, the bad guys kidnap the VIP and leave him/her unable to call for help. It'd require a determined attacker but for a VIP target it'd be worth it for the bad guys.
Being unable to call 999 without a SIM is a non issue because everybody I know has a SIM in their phone. Even if they are pre-paid you can still make a 999 call without any credit so there's no real advantage in allowing calls without a SIM.
The SIM-less restriction doesn't apply to every country because every national telecommunications regulator makes their own decision.
How long before you need to produce ID to buy a SIM? I'm not sure although the way things are going this may be introduced. However many calls are being made over modern technologies like VOIP services (like Signal or WhatsApp) or even TOX which can make tracing somebody virtually impossible. The metadata can be useful so that's one argument for requiring ID although Signal retain almost nothing.
That's Monty Python's "Minister of Silly Walks"; probably John Cleese! (in silhouette). NB: I typed this BEFORE listening to the show. Bring back Benny Hill!! or someone like him. Hurray fro MR. Bean!! Or others like him; The Python, Hill of Beans Liberation Army announces a massive takeover of the Internet. We have gone underground to keep up production so we may defeat the capitalist roaders who run the world. (That was from an old VC agit-prop film in the early stages of the Vietnamese War.) I'd say more. It would not be PC.
Wack-a-Doo, Wack-a-Doo,
BEBBEBBE, that's all folks.
About the Mark Carney email hoax, why doesn't IT departments setup their own internal email testing, a memo warning staff that they would be tested at certain times could be issued so they would be more aware of their own security.