Can Biometrics Be Hacked? Real Risks

Honest assessment of biometric security risks -- spoofing attacks on Face ID and Touch ID, liveness detection, practical threat models, and how to protect yourself.

Table of Contents

The question of whether biometrics can be hacked is one of the most commonly asked and most commonly misunderstood topics in security. The short answer is yes – biometric systems can be attacked. The longer, more useful answer requires understanding the difference between theoretical vulnerabilities demonstrated in research labs and the practical threat landscape that actual users face. This guide provides an honest assessment of biometric security risks within the broader context of biometric security for password management.

Defining “Hacked” in a Biometric Context

When someone says a biometric system has been “hacked,” they might mean several very different things:

  1. Spoofing: Presenting a fake biometric – a printed photo, a silicone fingerprint, a 3D mask – that the sensor accepts as genuine.
  2. Replay attack: Intercepting biometric data during transmission and replaying it to authenticate.
  3. Template theft: Extracting the stored biometric template from the system and using it to reconstruct or match against the original biometric.
  4. Bypass: Circumventing the biometric check entirely through a software vulnerability, without presenting any biometric data.
  5. Coercion: Physically forcing someone to authenticate using their biometric. This is not a technical attack on the biometric system itself, but it is a real-world risk that biometric authentication introduces.

Each of these attack vectors has a different difficulty level, a different set of prerequisites, and different mitigations. Treating them all as equivalent leads to misleading conclusions about biometric security.

Spoofing Attacks: What the Research Shows

Fingerprint Spoofing

Fingerprint spoofing is the most extensively researched area of biometric attack. The general approach involves:

  1. Obtaining a high-quality image of the target’s fingerprint (from a surface they touched, a high-resolution photograph, or a cooperative scan).
  2. Creating a mold or overlay using materials like silicone, gelatin, or conductive ink.
  3. Presenting the fake fingerprint to the sensor.

Research results: Multiple studies have demonstrated successful fingerprint spoofing against various sensors. In 2020, Cisco Talos published research showing that fingerprint spoofing could achieve approximately an 80% success rate against some sensors using a budget of around $2,000 and considerable expertise. However, Apple’s Touch ID was among the more resistant sensors in these tests, with lower success rates attributed to its capacitive design and sub-epidermal reading.

Current state: Modern Touch ID sensors incorporate liveness detection features that check for the electrical properties of living skin. The sub-epidermal reading depth means that surface-level molds miss important fingerprint characteristics. Current-generation Touch ID is significantly harder to spoof than the original 2013 implementation.

Practical barrier: A fingerprint spoofing attack requires obtaining a high-quality print from the target, access to fabrication materials and expertise, physical access to the target device, and multiple attempts (since the success rate is not 100%). This places fingerprint spoofing firmly in the category of targeted attacks requiring resources and motivation – not casual theft.

Face ID Spoofing

Face ID spoofing is more technically challenging than fingerprint spoofing because the system captures three-dimensional facial geometry using infrared technology.

Notable research: In 2017, Vietnamese security firm Bkav demonstrated a proof-of-concept Face ID spoof using a 3D-printed mask with silicone nose, 2D printed eyes, and makeup. The mask reportedly cost around $150 in materials but required a detailed 3D scan of the target’s face and considerable refinement to succeed.

In 2019, researchers at Tencent demonstrated a method to bypass liveness detection using modified glasses placed on an unconscious person – exploiting the attention-awareness feature for cases where the target was incapacitated.

Current state: Apple has significantly hardened Face ID since these demonstrations. Current-generation neural engines analyze skin texture, subsurface infrared scattering, micro-expressions, and other liveness indicators that are extremely difficult to replicate in an artificial construct. Each iOS update can include improved anti-spoofing models.

Practical barrier: A Face ID spoofing attack requires a detailed 3D scan of the target’s face (not just a photograph), the ability to produce a mask with appropriate infrared reflective properties, success against the latest anti-spoofing algorithms, and physical access to the device. This is a significantly higher bar than fingerprint spoofing and places Face ID attacks in the realm of nation-state or well-funded targeted operations.

Replay Attacks

In a replay attack, the attacker captures biometric data during a legitimate authentication and replays it later. On Apple devices, this attack vector is effectively eliminated by the Secure Enclave architecture.

Biometric data captured by Face ID or Touch ID is processed entirely within the Secure Enclave. The raw biometric data never traverses the main system bus in an unprotected form. There is no point in the authentication flow where an attacker can intercept the biometric data for later replay.

Furthermore, the Secure Enclave uses challenge-response mechanisms that make each authentication request unique. Even if biometric data could be captured, replaying it would not produce the correct response for a subsequent authentication challenge.

For password manager applications, this means that the biometric vault protection path is resistant to replay attacks by design. The key stored in the Secure Enclave requires a live biometric match, not a replayed data stream.

Template Theft

Biometric template theft – extracting the stored mathematical representation of your face or fingerprint – is a concern because templates, unlike passwords, cannot be changed. If your fingerprint template is stolen, you cannot grow a new fingerprint.

On Apple devices, template theft is addressed by the Secure Enclave’s design:

  • Templates are stored in the Secure Enclave’s encrypted memory, not in the main filesystem.
  • The encryption key for template storage is fused into the hardware during manufacturing and is not accessible via software.
  • No API exists that allows any software – including the operating system itself – to read biometric templates from the Secure Enclave.
  • Biometric templates are never included in device backups, iCloud sync, or diagnostic data.

Extracting a biometric template from an Apple Secure Enclave would require a hardware-level attack on the security coprocessor – invasive physical access to the chip, potentially including decapping and electron microscope analysis. This is the domain of the most sophisticated hardware security research and is not a practical attack for any attacker short of a well-funded national laboratory.

Software Bypass

Could an attacker bypass biometric authentication entirely through a software vulnerability? The risk exists in principle, but the architecture of Apple’s biometric authentication makes it extremely difficult.

The LocalAuthentication framework on iOS and macOS is a system-level API with hardened security. Apps cannot programmatically bypass the biometric check – they can only request authentication and receive a success or failure response. The actual biometric matching occurs in the Secure Enclave, which is hardware-isolated from the main operating system.

Historical vulnerabilities have occasionally been found in iOS’s lock screen behavior (allowing bypass of the lock screen through specific interaction sequences), but these affect device unlock rather than app-level biometric authentication. A lock screen bypass does not give access to Secure Enclave-protected keys, so it does not automatically unlock a biometrically protected password vault.

Coercion: The Non-Technical Risk

The risk that someone physically forces you to unlock your device with your biometric is real and is arguably the most practical “hack” of biometric systems. Unlike password entry, which requires conscious knowledge recall, biometric authentication can be performed on an unconscious, sleeping, or restrained person (with the caveat that Face ID’s attention awareness mitigates the sleeping scenario).

This risk has legal implications as well – in some jurisdictions, courts have ruled that compelling biometric device unlock may not violate Fifth Amendment protections against self-incrimination, while compelling password disclosure may.

Mitigations for coercion scenarios:

  • Emergency disable: On iPhone, pressing the side button five times rapidly triggers Emergency SOS and requires the passcode for next unlock, disabling Face ID. On Mac, restarting the computer disables Touch ID until the password is entered.
  • Timeout policies: iOS requires the passcode (not biometrics) after 48 hours of inactivity, after a device restart, or after five failed biometric attempts.
  • Awareness: Simply knowing that you can quickly disable biometric unlock gives you the option to do so if you anticipate a coercive situation.

Realistic Threat Assessment

For most users of password managers like PanicVault, the realistic threat assessment for biometric attacks is as follows:

Low risk: Spoofing attacks. These require targeted effort, physical access, and technical expertise. The vast majority of users face essentially zero risk from spoofing attacks.

Low risk: Template theft and replay attacks. These are effectively prevented by the Secure Enclave architecture on Apple devices.

Low risk: Software bypass. While possible in theory, the hardware-isolated architecture makes this extremely difficult to exploit for Secure Enclave-protected keys.

Moderate risk: Device theft with the intent to compel biometric unlock. This risk is higher for users who might be targeted for the specific contents of their vault – journalists, activists, executives with valuable credentials. For these users, understanding the emergency disable mechanisms is essential.

Highest practical risk: Shoulder surfing and social engineering. Ironically, the biggest real-world risk is not a biometric attack at all – it is someone watching you enter your master password on the occasions when biometric authentication is unavailable (after a restart, for example). Biometric unlock actually reduces this risk by reducing the number of times you type your password in public.

How Password Managers Mitigate Biometric Risks

Well-designed password managers implement several safeguards that mitigate the risks described above:

  1. Master password remains required periodically. Even with biometric unlock enabled, the master password is required after device restarts and extended timeouts. This ensures that biometric bypass alone does not provide indefinite access.

  2. Secure Enclave key invalidation. If biometric enrollment changes (Face ID is re-enrolled, a new fingerprint is added), the Secure Enclave invalidates stored keys. PanicVault uses the kSecAccessControlBiometryCurrentSet policy, which ties the stored vault key to the specific biometric enrollment that existed when it was created.

  3. Configurable auto-lock. Users can set short auto-lock timeouts so the vault is only decrypted for brief periods, limiting the window of exposure.

  4. No biometric data in the app. Password managers that properly use Apple’s LocalAuthentication framework never see, process, or store biometric data. The biometric verification is entirely handled by the operating system and Secure Enclave, not by the app.

The Bottom Line

Can biometrics be hacked? Yes, in the sense that no security system is absolutely impenetrable. Spoofing attacks have been demonstrated, coercion scenarios are real, and future vulnerabilities may be discovered.

Should this stop you from using biometric unlock on your password vault? No. The practical security improvement of biometric unlock – enabling strong master passwords, reducing password exposure, providing fast re-locking – outweighs the theoretical risks for the vast majority of users. The biometric attack scenarios that succeed in practice require targeted, resourced attackers with physical access to your device, and even then, the Secure Enclave architecture on Apple devices provides robust protection.

The key is to use biometrics as part of a layered security approach: strong master password as the foundation, biometric unlock for convenient daily access, awareness of emergency disable mechanisms, and good general device security practices. This layered approach gives you the benefits of biometric convenience without placing your entire password security on a single authentication factor.

Protect Your Passwords with PanicVault

A secure, offline-first password manager using the open KeePass format. Your passwords, your file, your control.

Download on the App Store