Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
63,490
30,731


The AirTag feature that allows anyone with a smartphone to scan a lost AirTag to locate the contact information of the owner can be abused for phishing scams, according to a new report shared by KrebsOnSecurity.

f1618938547.jpg

When an AirTag is set in Lost Mode, it generates a URL for https://found.apple.com and it lets the AirTag owner enter a contact phone number or email address. Anyone who scans that AirTag is then directed automatically to the URL with the owner's contact information, with no login or personal information required to view the provided contact details.

According to KrebsOnSecurity, Lost Mode does not prevent users from injecting arbitrary computer code into the phone number field, so a person who scans an AirTag can be redirected to a phony iCloud login page or another malicious site. Someone who does not know that no personal information is required to view an AirTag's information could then be tricked into providing their iCloud login or other personal details, or the redirect could attempt to download malicious software.

The AirTag flaw was found by security consultant Bobby Raunch, who told KrebsOnSecurity that the vulnerability makes AirTags dangerous. "I can't remember another instance where these sort of small consumer-grade tracking devices at a low-cost like this could be weaponized," he said.

Rauch contacted Apple on June 20, and Apple took several months to investigate. Apple told Rauch last Thursday that it would address the weakness in an upcoming update, and asked him not to talk about it in public.

Apple did not answer his questions about whether he would receive credit or whether he qualified for the bug bounty program, so he decided to share details on the vulnerability because of Apple's lack of communication.
"I told them, 'I'm willing to work with you if you can provide some details of when you plan on remediating this, and whether there would be any recognition or bug bounty payout'," Rauch said, noting that he told Apple he planned to publish his findings within 90 days of notifying them. "Their response was basically, 'We'd appreciate it if you didn't leak this.'"
Last week, security researcher Denis Tokarev made several zero-day iOS vulnerabilities public after Apple ignored his reports and failed to fix the issues for several months. Apple has since apologized, but the company is continuing to receive criticism for its bug bounty program and the slowness with which it responds to reports.

Article Link: AirTag 'Lost Mode' Vulnerability Can Redirect Users to Malicious Websites
 

apparatchik

macrumors 6502a
Mar 6, 2008
844
2,615
They really need someone in charge of communicating back to researchers, who's only job is to keep reports flowing and answer around the clock so whoever deserves recognition / payout gets it, otherwise they'll start reporting to the Pegasus of the world instead.
 

mariusignorello

Suspended
Jun 9, 2013
2,092
3,168
Anything consumer grade is vulnerable to attacks, inconsistencies and inconvenience because of the casual non-mission critical nature of the hardware. Apple typically is the exception to this but when you get into cheap gadgetry like AirTags then it’s not surprising. These aren’t commercial grade GPS units like UPS or the likes would use.
 

Smith288

macrumors 65816
Feb 26, 2008
1,222
962
This seems like an expensive scam to try to do. And hardly useful. But it’s still a pretty ugly rookie thing to do as a huge tech company.
 
  • Like
Reactions: KeithBN

nitramluap

Cancelled
Apr 26, 2015
440
994
But doesn't an AirTag have to be linked to a legitimate iCloud account for it to be activated and then put into Lost Mode in the first place? So why would someone start a phishing attack using a device linked to their personal iCloud account? Seems like a storm in a teacup.
 

Art Mark

macrumors 6502
Jan 6, 2010
482
1,203
Oregon
Rofl. And Apple has the chutzpah to claim they care about & protect user privacy
So you think this mistake, is. sign that Apple doesn't care about security or privacy? Really? Of the thousands of methods out there on every platform that allow hacks, this is a sign to you that Apple is lying when they say they care about security and privacy? I think you are overreacting. Or just haven't thought out what you write.
 

matrix07

macrumors G3
Jun 24, 2010
8,226
4,891
Lost Mode does not prevent users from injecting arbitrary computer code into the phone number field, so a person who scans an AirTag can be redirected to a phony iCloud login page or another malicious site. Someone who does not know that no personal information is required to view an AirTag's information could then be tricked into providing their iCloud login or other personal details, or the redirect could attempt to download malicious software.
It's good that someone is checking this but I mean it's getting to the ridiculous territory here. If I scan AirTag in hope of helping someone and find that I have to log in I will just not bother.
 
Last edited:

Altivec88

macrumors regular
Jun 16, 2016
213
812
Its just sad what Apple has become. Here you have people finding vulnerabilities that the staff you pay didn't find. It's essentially like having other people on your payroll that you only have to pay if they find something. Instead they treat them like crap, ignoring simple credit, trying to hush them, or worse yet just ignoring the vulnerability. Its not like paying them would even be a blip in the billions/quarterly profit they make. Instead of encouraging people to report these thing to them, they push them away to potentially sell it to the bad guys. Hopefully it's worth the bad PR, unknown security holes, and the continued erosion of their "privacy" marketing BS.
 

Chaos215bar2

macrumors regular
Jan 11, 2004
211
549
These aren’t commercial grade GPS units like UPS or the likes would use.
I’d be willing to bet those commercial units are full of vulnerabilities. But unless UPS allows their scanners to receive messages from or connect to anything other than their own internal servers (which would be silly), the attack surface is pretty much limited to malicious barcodes.
 

thisisnotmyname

macrumors 68020
Oct 22, 2014
2,438
5,251
known but velocity indeterminate
Although I certainly don't condone Apple hesitating in addressing security issues I'm also starting to view "security researchers" as petty people who put themselves over the security of us all. "Apple didn't commit to recognizing that I found out I can inject some HTML into the AirTags message so now I'm going to go tell the world how to break this," isn't a mature response.
 

randyhudson

macrumors 6502a
Oct 28, 2007
680
980
USA
So you think this mistake, is. sign that Apple doesn't care about security or privacy? Really? Of the thousands of methods out there on every platform that allow hacks, this is a sign to you that Apple is lying when they say they care about security and privacy? I think you are overreacting. Or just haven't thought out what you write.
This is hardly a hack. It’s web security 101. You don’t simply inject user-defined data into a page without properly escaping, sanitizing, and/or validating it. And really it should be validated/restricted on the way in as well.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.