The Register Home Page

back to article German security researchers say 'Windows Hell No' to Microsoft biometrics for biz

Microsoft is pushing hard for Windows users to shift from using passwords to its Hello biometrics system, but researchers sponsored by the German government have found a critical flaw in its business implementation. In a presentation at the Black Hat conference in Las Vegas, Dr Baptiste David and Tillmann Osswald from …

  1. Sora2566

    Well, balls. How do you check if you're using ESS?

    1. FILE_ID.DIZ
      Holmes

      Using Sysinternal's CoreInfo tool and a webpage from 2011 (yes, apparently 14 years ago if the date is trustworthy), you can check if your computer meets the requirements.

      https://www.howtogeek.com/73318/how-to-check-if-your-cpu-supports-second-level-address-translation-slat/

      Note: Do execute the correct bitness version of coreinfo.exe. Running the 32-bit version on a 64-bit OS fails to work.

    2. The man with a spanner Silver badge

      Good job, but...

      Good spot and qudos to the researchers and the German government for sponsoring the research.

      Unfortunatly in other news Palantir are helping German police with combining access to their software.

      https://www.dw.com/en/german-police-expands-use-of-palantir-surveillance-software/a-73497117

      This all looks like it is going to end in a very dark place now we have the tool of oppresion readily available and functional to a level that the Stazi could only dream about.

      Sorry to be a black and gloomy cloud.

      1. Anonymous Coward
        Anonymous Coward

        this is exactly what the Bundesregierung should care about !!!

        frankly

        not to be trusted

        azure entra across all layers...

        your done

  2. Rich 2 Silver badge

    Duh!

    This is Microsoft we’re talking about. Of COURSE their new super security is shite!

    What else did you expect?

    Seriously…. What?

    1. Doctor Syntax Silver badge

      Re: Duh!

      But shite or not I suppose it harvests a lot of biometric data form Microsoft.

    2. Marty McFly Silver badge
      Thumb Up

      Double edge sword

      As my cybersecurity career is winding down and an exit visa is increasingly imminent, I have to reflect honestly on the past three decades....

      • Why they hell are we still trusting Microsoft with anything security related? They never get it right.
      • Selling extended support for "Security Updates" has become a revenue stream for them.
      • Not much incentive to do it right if they can charge money to fix it later.
      • And finally... Damn, I have made a lot of money over those years selling products and services to secure the Windows platform.

  3. Ishura

    > a local admin, or someone who has access to their credentials via malware or other means, can inject biometric information into a computer that would allow it to recognize any face or fingerprint

    This sounds suspiciously like "a local administrator can administer the local machine". What am I missing? What's the actual flaw here?

    1. Joe W Silver badge

      Good question, thought about that as well:

      As far as I understand that: the local admin should not be able to do things that influence how you authenticate against Active Directory. Yes, local admin can local admin, and if you pwn the local admin account you have more problems coming up. But this basically lets an attacker move to other systems via AD using the AD account of another user. The local admin is (usually) only authenticated at the local machine not for the whole AD. (I'd argue if the local admin account can do stuff on other systems it is not a local admin account - at least those are the distinctions at $(myworkplace) ).

      1. Casca Silver badge
        Pint

        Good answer

      2. SVD_NL Silver badge

        Great answer.

        In addition to that, this would bypass other restrictions you can enable in windows. For example, Personal Data Encryption (PDE) uses windows hello to encrypt files, which means even local admins cannot access them.

        Also relevant suggestion: harden your CA policies in entra. For admin portals i prefer requiring a compliant device and excluding WHfB as an auth method (bonus points for short session times). this isn't user-friendly, but requires breaching both a device (without malware detections if set up properly), and a separate 2FA method.

    2. ecofeco Silver badge

      Becasue it only takes one lucky hit of an admin local account that has the same access to AD/Azure/Entra/InTune to ruin everyone's day.

      And those exist far more than most people think.

      Not to mention M$ never ending vulnerabilities that either weren't patched by users yet, or ones we don't yet know about.

      While I'm not a security pro, I HAVE looked over CISSP, CND, and CompTIA material as it's adjacent to my field and the vulnerabilities are... goddamn unbelievable.

      Sleep well!

  4. Tron Silver badge

    Listen when Nancy Reagan tells you to 'just say no', kids.

    No to drugs. No to biometrics. No to AI. No to Recall.

    Stick with unique passwords, and if you use Windows, make it LTSC.

    1. HXO

      Re: Listen when Nancy Reagan tells you to 'just say no', kids.

      Keed spills, mkay?

    2. GNU Enjoyer
      Angel

      Re: Listen when Nancy Reagan tells you to 'just say no', kids.

      No - rather listen to saint iGNUcius when he suggests you say no even once.

      No to propriety drugs even once. No to biometrics even once. No to proprietary software and SaaSS even once (LLMs).

      Say no to passwords for public systems.

      For private computers, use authentication methods that can be reset once leaked like passwords.

      Say no to windows even once - using a LTSC version is of no meaningful difference and means never saying no to windows.

      1. LVPC Bronze badge

        Re: Listen when Nancy Reagan tells you to 'just say no', kids.

        >> No to propriety drugs even once.

        That is one hill only a fool (like St iGNutius) would choose to die on. And he's certainly free to do so. Patents eventually expire. In the meantime, best to stay alive until the drug you depend on is available as a generic.

        1. Anonymous Coward
          Anonymous Coward

          Re: Listen when Nancy Reagan tells you to 'just say no', kids.

          Unless you live in a country with a good socialised medical system where the drugs are subsidised.

          I'm on an anti cancer monoclonal antibody drug. In the US it's $11,000 a script in Oz it's $7.20.

    3. Paul Hovnanian Silver badge

      Re: Listen when Nancy Reagan tells you to 'just say no', kids.

      "make it LTSC"

      Fine for professionally administered systems/networks. But not really viable for the SOHO user. Where Microsoft depends on frequent patches/updates to introduce its users to its creeping features.

  5. GNU Enjoyer
    Angel

    Biometrics are inheriently flawed

    Even if you have a perfect reader that cannot be exploited or tricked, everyone who has ever been attacked with regular biometric scans, or is visible in public photos of decent resolution has had their biometrics leaked.

    Once your biometrics have been leaked, you cannot reset them (while it's trivial to reset a password).

    Fingerprints seem to be the only biometrics that can be partially reset, but that is a quite invasive surgery that leaves extensive scarring; https://www.theregister.com/2009/12/08/fingerprint_surgery/ (it seems you can only swap the fingerprints around - if you attempt to burn your fingerprints off with acid while leaving the rest of your fingers intact, you'll find them eventually growing back).

    1. seven of five Silver badge
      Joke

      Re: Biometrics are inheriently flawed

      > Once your biometrics have been leaked, you cannot reset them

      meet my Husqvarna 545...

      1. M.V. Lipvig Silver badge

        Re: Biometrics are inheriently flawed

        How many times ya gonna want to run that particular reset?

    2. Nick Ryan

      Re: Biometrics are inheriently flawed

      It's the usual broken by design for security by Microsoft.

      Face ID and similar do not replace the secret component in security, no matter what sci-fi series you want it to be like. They are identifiers and should never replace the secret component in authentication. This makes them good as a replacement for the user ID side of things, it makes them a good additional component in addition to a password, but they make an appalling and backwards step when replacing a password

    3. ecofeco Silver badge

      Re: Biometrics are inheriently flawed

      Once your bio-metrics have been leaked, you cannot reset them (while it's trivial to reset a password).

      The heart of the matter right there.

    4. Paul Hovnanian Silver badge

      Re: Biometrics are inheriently flawed

      Biometrics are OK if used as the "user ID" part of authentication. But you'll still need to enter that (resetable) password or token.

      That picture of my surly mug just demonstrates to the system that, "Yes. It still is me sitting at the keyboard." Should that change, I'll be prompted for the password of the new chair's occupant.

    5. LVPC Bronze badge

      Re: Biometrics are inheriently flawed

      Some fingerprints are "immune" to scanning . Some, the ridge are not well enough defined, either because of genetics, or medication, or simple wear and tear.

      And some, it just doesn't work for unknown reasons - the algorithms fail. Shit happens.

  6. Rick594

    The last Windows 11 update stopped Windows Hello from working, it no longer logs in using facial recognition. I won't bother trying to fix it now.

  7. MachDiamond Silver badge

    One standard to rule them all

    If M$ wraps this tech in an easy to use shell, everybody will find it easy to implement. This means that whatever biometric is harvested will be harvested and coded in the same way so systems everywhere will know who you are. It becomes the same as somebody using the same password for everything so if you know their password for InstaPintaTwitFace, you know their password for their retirement account at the bank.

    1. Jamie Jones Silver badge
      Happy

      Re: One standard to rule them all

      "...so if you know their password for InstaPintaTwitFace,"

      I thought I knew you from somewhere else!

  8. ecofeco Silver badge
    FAIL

    Meet my digital twin

    They can't keep a secret.

  9. M.V. Lipvig Silver badge

    The perfect solution -

    Tell M$ to fuck off. It's incredibly easy to do.

  10. DoctorNine Silver badge

    1996

    That's when I first started predicting this Microsoft trajectory. It's SkyNet kids. Avoid it if you can. Build an alternative. It's our only hope.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like