Major Security Flaw in Apple’s Find My Network Could Let Hackers Track Any Bluetooth Device

Major Security Flaw in Apple’s Find My Network Could Let Hackers Track Any Bluetooth Device

Major Security Flaw in Apple’s Find My Network Could Let Hackers Track Any Bluetooth Device

Apple’s Find My Network has a critical vulnerability, allowing hackers to silently track any Bluetooth-enabled device by tricking the network into thinking it’s an AirTag. Researchers discovered the flaw, dubbed ‘nRootTag,’ which can pinpoint a device’s location with 10-foot accuracy. The exploit works on a wide range of devices, including smartphones, laptops, and IoT devices, and has a 90% success rate. Although Apple acknowledged the issue, a fix may take years to implement. Users are advised to be cautious with Bluetooth permissions and keep their devices updated for protection.

CONTENTS:

Major Security Flaw in Apple’s Find My Network Could Let Hackers Track Any Bluetooth Device
Major Security Flaw in Apple’s Find My Network Could Let Hackers Track Any Bluetooth Device

Major Security Flaw in Apple’s Find My Network Could Let Hackers Track Any Bluetooth Device

Apple’s Find My network, primarily used for tracking lost items like AirPods and iPhones, has a serious security vulnerability that could allow hackers to track nearly any Bluetooth-enabled device. Researchers at George Mason University discovered the exploit, dubbed ‘nRootTag,’ which uses a device’s Bluetooth address in combination with Apple’s network to trick the device into thinking it’s a lost AirTag. This allows the device to send Bluetooth signals to nearby devices, which then anonymously relay the device’s location via Apple’s cloud. The exploit works on a wide range of devices, including desktops, smartphones, and IoT devices, with a 90% success rate.

In one test, the researchers were able to track a stationary computer within 10 feet, follow a moving e-bike through a city, and even trace the exact flight path of a gaming console aboard a plane. The flaw is particularly dangerous because it could allow hackers to track victims in real time without requiring any special privileges.

Although Apple’s Find My network is encrypted, researchers bypassed this by finding a compatible key for the Bluetooth address. This issue raises privacy concerns, as the exploit could be used for stalking or harassment. Apple has acknowledged the issue, but no fix is expected for a few years. In the meantime, users are advised to be cautious about granting Bluetooth permissions to apps and to keep devices updated.

 

Apple’s Find My Network Exploit Lets Hackers Track Any Bluetooth Device Silently

Apple’s Find My Network, which helps users locate their Apple devices like iPhones, Macs, and AirPods, has a significant security vulnerability that could allow hackers to silently track any Bluetooth-enabled device. Researchers from George Mason University discovered the flaw, known as ‘nRootTag,’ which exploits a weakness in the Bluetooth functionality of the Find My service.

The exploit tricks Find My into believing a targeted device is a lost AirTag, prompting it to send Bluetooth signals to nearby Apple devices. These devices then relay the location back to the hacker via Apple’s servers, without the device owner’s consent. The exploit works without requiring admin privileges and has an impressive 90% success rate, enabling the hacker to pinpoint a device’s location to within 10 feet in just a few minutes.

nRootTag affects a wide range of Bluetooth devices, including those running Android, Linux, or Windows. The researchers informed Apple of the vulnerability in July 2024 and suggested updates to improve device verification on Find My Network. However, Apple has yet to release a fix for the issue.

 

Apple’s Find My Network Flaw Lets Hackers Track Any Bluetooth Device Like an AirTag

Apple’s Find My Network contains a critical flaw that allows hackers to silently track any Bluetooth-enabled device, turning them into tracking beacons similar to AirTags. Researchers from George Mason University uncovered this vulnerability, dubbed ‘nRootTag,’ which tricks the Find My Network into believing a device is a lost AirTag. This flaw can track the location of devices, such as smartphones, laptops, and IoT devices, with an accuracy of up to 10 feet, even tracking larger items like e-bikes across a city. The exploit can also be used to pinpoint the location of hacked smart locks.

The researchers used GPUs to identify a compatible key for the Bluetooth address of a device, circumventing Apple’s privacy protections that normally require elevated privileges. This method has a 90% success rate and could be misused by advertisers to track users without GPS, even on mobile devices, laptops, and VR headsets.

The researchers reported the flaw to Apple in July 2024, and while Apple acknowledged it in iOS 18.2, the company has yet to implement a proper fix. Due to the need for an update to the Find My Network, a resolution may take years as outdated devices phase out. Users are advised to be cautious when granting Bluetooth permissions and to ensure their devices are up to date, while considering privacy-focused operating systems for additional protection.

 

Check out TimesWordle.com  for all the latest news

Leave a Reply

Your email address will not be published. Required fields are marked *