49 lines
2.3 KiB
JSON
49 lines
2.3 KiB
JSON
{
|
|
"objects": [
|
|
{
|
|
"name": "Biometric Spoofing",
|
|
"description": "An adversary could attempt to spoof a mobile device's biometric authentication mechanism, for example by providing a fake fingerprint as described by SRLabs in (Citation: SRLabs-Fingerprint).\n\niOS partly mitigates this attack by requiring the device passcode rather than a fingerprint to unlock the device after every device restart and after 48 hours since the device was last unlocked (Citation: Apple-TouchID).\n\nPlatforms: Android, iOS",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "mitre-mobile-attack",
|
|
"phase_name": "exploit-via-physical-access"
|
|
}
|
|
],
|
|
"external_references": [
|
|
{
|
|
"url": "https://attack.mitre.org/mobile/index.php/Technique/MOB-T1063",
|
|
"source_name": "mitre-mobile-attack",
|
|
"external_id": "MOB-T1063"
|
|
},
|
|
{
|
|
"description": "SRLabs. (n.d.). Fingerprints are not fit for secure device unlocking. Retrieved December 23, 2016.",
|
|
"source_name": "SRLabs-Fingerprint",
|
|
"url": "https://srlabs.de/bites/spoofing-fingerprints/"
|
|
},
|
|
{
|
|
"description": "Apple. (2015, November 3). About Touch ID security on iPhone and iPad. Retrieved December 23, 2016.",
|
|
"source_name": "Apple-TouchID",
|
|
"url": "https://support.apple.com/en-us/HT204587"
|
|
}
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
|
|
],
|
|
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
|
|
"created": "2017-10-25T14:48:24.069Z",
|
|
"x_mitre_platforms": [
|
|
"Android",
|
|
"iOS"
|
|
],
|
|
"x_mitre_tactic_type": [
|
|
"Pre-Adversary Device Access"
|
|
],
|
|
"id": "attack-pattern--45dcbc83-4abc-4de1-b643-e528d1e9df09",
|
|
"modified": "2018-04-13T17:05:30.756Z",
|
|
"type": "attack-pattern"
|
|
}
|
|
],
|
|
"type": "bundle",
|
|
"id": "bundle--c38a8e11-862f-46e3-bfd0-904063c2e1a1",
|
|
"spec_version": "2.0"
|
|
} |