Biometric Spoofing - T1460 (45dcbc83-4abc-4de1-b643-e528d1e9df09)
An adversary could attempt to spoof a mobile device's biometric authentication mechanism, for example by providing a fake fingerprint as described by SRLabs in (Citation: SRLabs-Fingerprint).
iOS partly mitigates this attack by requiring the device passcode rather than a fingerprint to unlock the device after every device restart and after 48 hours since the device was last unlocked (Citation: Apple-TouchID).
Platforms: Android, iOS
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Lockscreen Bypass - T1461 (dfe29258-ce59-421c-9dee-e85cb9fa90cd) | Attack Pattern | Biometric Spoofing - T1460 (45dcbc83-4abc-4de1-b643-e528d1e9df09) | Attack Pattern | 1 |