The significant breach and vulnerabilities recently discovered by vpnMentor researchers within Suprema’s BioStar 2 database are enough to scare any potential end-user away from biometric security measures, according to Frost & Sullivan security expert Danielle VanZandt.
VanZandt said that with more than a million fingerprint biometrics and user passwords exposed in the breach, BioStar 2 had become the first significant example of how biometric access still has its vulnerabilities that vendors, integrators, and end-users must be aware of before implementing any of these solutions within their organisation, she said
The most worst part of BioStar 2’s vulnerabilities was its biometric database that was unprotected when connected to the internet and a lack of encryption for stored fingerprints and facial recognition bases. This allowed hackers to get into the biometric database and access stored user fingerprints and facial data, potentially add and change user profiles, and provide a convenient entry point into the end-user’s entire network. Hackers were able to access passwords and log entries listing user names, profiles, biometric data, and passwords for user and administrator accounts listed in plain text—some of the most valuable data for fraudsters to obtain.
VanZandt said consequences of data like this falling into the wrong hands could be catastrophic to an end-user, particularly considering the breadth of BioStar 2’s customer base. Affected customers include gyms, co-working spaces, software consultancies, and consumer foods, medical, and industrial products, manufacturers. It hits Suprema’s global customer base throughout North America, Europe, Asia, and the Middle East. Suprema has shown interest in expanding BioStar 2’s customer base to include government, banking, and law enforcement—verticals that will quickly shy away from any security vendor that does not have proper data security protocols in place.
Biometric data points, such as fingerprints and facial data, cannot be stored as full, unencrypted data points; current industry expertise emphasises the need to have this data saved in a hashed format, preventing the biometric from being reverse-engineered by hackers. Since users cannot change their face or fingerprint, the onus falls on security vendors to ensure that processes similar to reverse hashing and database encryption pieces are top-tier to protect this valuable data from falling into the wrong hands.
While this may be one of the first data breaches to target biometric data, it most certainly will not be the last. The sheer scale of BioStar 2, unfortunately, made the system one of the first to reveal the vulnerabilities of biometric access control solutions; however, this will not stop the exponential growth and adoption rates of biometric solutions. Fingerprint and facial recognition remain the most in-demand biometrics out there for physical access solutions across various industries. This breach will not scare away potential end-user purchases; instead, it will serve to inform them of the types of security protocols a vendor must have in place before a potential end-user finalises any new system purchase. Vendors must be ready to answer end-user questions about data access, precisely how their solution stores biometric data, and what encryption protocols are in place.
End users are quickly assessing their risk profiles and the best solutions to protect their organisation. Any biometric security vendor unwilling or unable to best address an end-users’ risk concerns and data protection questions will quickly see their stature in this high-growth market diminish, VanZandt said.