That's a load of people never buying one second hand from now on...
Why would anyone buy a second hand tracking device anyway? They are $29, not $2900.
That's a load of people never buying one second hand from now on...
what time are you from?..This guy may could hack TouchID in Iphones 12 in the near future.
Sure, but the same exploit would work with anything. One could do it with a Tile, or just a regular Airtag that was next to your homemade beacon. To me, the big question is the wisdom of broadcasting a website, and especially opening a website that's being broadcast.The scenario is: modify your airtag to have a URL to a compromised site (phishing or a drive by site like the ones patched in the last update). Anyone who then scans it can be compromise. Drop it at a company's corporate headquarters by the security office or by the CEO's (BoD's, executives, maintenance, food, coffee provider etc) car (or any other office) and then eventually someone will scan it. They then enter the office, join wifi etc with a compromised device which can scan for unprotected devices, monitor network traffic etc. Likewise, their credentials will be then compromised making further intrusions easier.
It is like any machine, with physical access most things can be compromised. This just increases the attack vectors for people who pick them up.
I never understand this constant nonsense about losing Airtags. There should be very little chance of this happening. Aren't most people buying them to put on their keyring? Aren't most people going to put them in their purse or wallet? Aren't others going to clip them to the inside of their luggage? Aren't the rest going to hook them to their pet's collar? If any of the above gets lost I would think people are more concerned about their keys, wallet, purse, luggage or pets getting lost over a $29 Airtag. Please stop these ridiculous posts about losing Airtags! It's not like people are buying them put lay on the table at work, a cafe or on a park bench. 🙄So if you lose your AirTag and then find it after one day for example, you cannot trust it anymore? Or if you find someones AirTag should you be also wary of placing it near your own phone? This gets interesting.
Unless you're a high profile target. Then you just need to get the high profile target's kid to scan the airtag, infect his phone with a 0-day drive by, and suddenly you have network access to this high profile targets' home network.This won't apply to the vast vast majority of users. It's a security exercise that's just to prove it's possible. People who needs to be worried about this type of exploits won't be using any trackers of this type anyways.
It will add you to a list at a minimum.Anyone who then scans it can be compromised? How, exactly? Phishing generally requires a user to respond to a request that is verifiable as dubious. I don't see how this is any different to any other phishing attempt, except a million times harder for the bad actor to actually implement.
They would need to require, all code running on an AirTag to be cryptographically signed. That would require changes to the hardware, not just the software.So there is no way for Apple to fix this?
I can imagine Airtag can be updated over the air with the user’s iPhone, if this hack can be patch via software. May not work though.So there is no way for Apple to fix this?
What 0-day drive by? And how would you access my home network? And why on earth would you use an AirTag in between? New risk: If you attach an AirTag to a hammer and lose both, a burglar could find both and use the hammer to break into some house!Unless you're a high profile target. Then you just need to get the high profile target's kid to scan the airtag, infect his phone with a 0-day drive by, and suddenly you have network access to this high profile targets' home network.
As with most *proof of concept* exercises, they of themselves aren't what is interesting.So…. It’s been hacked to be a customizable nfc tag. Looks like a lot of trouble to go through. I could also just put new nfc tags inside the AirTag’s case and accomplish the same thing. Security on your personal device is already in place - the link is displayed on the phone asking if you want to open it first before visiting the URL. https://electronics.howstuffworks.com/nfc-tag.htm
I had the same reaction...maybe there are some practical applications...but NFC tags are so much cheaper. I wonder if you hid an NFC tag in an air tag if it would still work.So…. It’s been hacked to be a customizable nfc tag. Looks like a lot of trouble to go through. I could also just put new nfc tags inside the AirTag’s case and accomplish the same thing. Security on your personal device is already in place - the link is displayed on the phone asking if you want to open it first before visiting the URL. https://electronics.howstuffworks.com/nfc-tag.htm
Theoretically someone could hack an AirTag to show up to others phones as "lost", but instead of pointing to the Apple URL that assists in locating the owner of the tag, the URL would be changed to a custom one.What 0-day drive by?
Actually this confirmation exists for the airtag as well, functionally this is a perfect comparison.just wanted to point out, that essentially you can just roll your own honeypot hw - it just needs to fit into something that _looks_ like an AirTag. no need for hacks.
and you can use less complicated ways to get your alternative URL to where it belongs.
either way, it's just like a 'malicious' QR code. maybe the only difference is that the built-in reader in camera app asks you for a confirmation before visiting the decoded URL.