A breach in a database of biometric security smart lock platform Suprema BioStar 2 exposed more than one million fingerprint records as well as facial recognition information and other sensitive data.
The web-based system is used by the likes of the U.K. Metropolitan Police to control access to physical facilities and manage users permissions. Researchers from vpnMentor led by Noam Rotem and Ran Locar on August 5 were able to access the data, which was since secured by August 13.
“The data leaked in the breach is of a highly sensitive nature. It includes detailed personal information of employees and unencrypted usernames and passwords, giving hackers access to user accounts and permissions at facilities using BioStar 2,” according to a vpnMonitor blog post. “Malicious agents could use this to hack into secure facilities and manipulate their security protocols for criminal activities.”
Calling the breach “a huge leak that endangers both the businesses and organizations involved, as well as their employees,” the researchers said they were “able to access over 1 million fingerprint records, as well as facial recognition information” that when combined with the personal information and credentials creates a “massive” potential for criminal activity and fraud.
Researchers alerted Suprema on Aug.7 just two days after discovering the leak but found the company “generally very uncooperative.” After numerous attempts, they spoke with a member of the vendor’s German team who said that “we don’t speak to vpnMentor” and hung up, according to the blog post. Entreaties to BioStar 2’s GDPR compliance officer were likewise rebuffed thought the researchers eventually got through to the company’s French branch and the breach was subsequently closed.
While exposed buckets have become quite commonplace, the BioStar 2 leak raised alarms. “Unlike usernames and passwords, biometric information such as fingerprints and facial recognition records cannot be changed,” said Matan Or-El, co-founder and CEO of Panorays. “And because Suprema is connected to thousands of organizations across the world, this compromised data has the power to rattle the entire supply chain.”
The breach is further warning that organizations must “be vigilant about how they outsource their customer and employee data and how that data is stored and processed,” he said. “Organizations need to ensure that their suppliers and business partners are on par with the organization’s own security standards and continuously uphold their suppliers to that standard. This should be part of their supplier management process, including vetting and continuously monitoring these suppliers to take action on any change in the security.”