Skip to content

Hide Navigation Hide TOC

Biometric Spoofing - T1460 (45dcbc83-4abc-4de1-b643-e528d1e9df09)

An adversary could attempt to spoof a mobile device's biometric authentication mechanism, for example by providing a fake fingerprint as described by SRLabs in (Citation: SRLabs-Fingerprint).

iOS partly mitigates this attack by requiring the device passcode rather than a fingerprint to unlock the device after every device restart and after 48 hours since the device was last unlocked (Citation: Apple-TouchID).

Platforms: Android, iOS

Cluster A Galaxy A Cluster B Galaxy B Level
Biometric Spoofing - T1460 (45dcbc83-4abc-4de1-b643-e528d1e9df09) Attack Pattern Lockscreen Bypass - T1461 (dfe29258-ce59-421c-9dee-e85cb9fa90cd) Attack Pattern 1