• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts create apple airtag clone that can bypass anti tracking measures

Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures

You are here: Home / General Cyber Security News / Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures
February 28, 2022

Cybersecurity researchers have managed to construct a clone of Apple Airtag that circumvents the anti-stalking safety technology constructed into its Find My Bluetooth-based monitoring protocol.

The final result is a stealth AirTag that can successfully monitor an iPhone consumer for above five times without the need of triggering a monitoring notification, Good Security’s co-founder Fabian Bräunlein reported in a deep-dive revealed past 7 days.

Uncover My is Apple’s asset monitoring app that enables users to monitor the GPS location of iOS, iPadOS, macOS, watchOS units, AirPods, AirTags as well as other supported third-party equipment by means of a connected iCloud account. It also enables buyers to perspective the spot of many others who have opted to share their location.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

This is considerably from the to start with time weaknesses have been uncovered in Apple’s Locate My system. In March 2021, the Protected Cell Networking Lab at the Technological University of Darmstadt, Germany (SEEMO) disclosed style and implementation flaws in the protocol that can guide to a site correlation attack and unauthorized obtain to users’ site histories

Then in Might 2021, Bräunlein followed it up by sharing aspects of a conversation protocol created on leading of Discover My that permits arbitrary information to be uploaded from non-internet-connected equipment by sending “Find My” Bluetooth broadcasts to close by Apple gadgets that can have out the facts upload.

The progress also comes as Apple, before this thirty day period, introduced a raft of new anti-stalking actions to AirTags to protect against their misuse involved with tracking unsuspecting folks without having their consent, inserting a warning notifying end users that performing so has prison repercussions.

“If an AirTag, set of AirPods, or Uncover My network accent is uncovered to be unlawfully monitoring a man or woman, regulation enforcement can ask for any readily available info from Apple to assistance their investigation,” Apple spells out in an current help posting.

But the “Uncover You” AirTag clone devised by Constructive Security aims to get around “every single present-day and approaching security evaluate.” It truly is also designed working with OpenHaystack, an open-supply framework made by SEEMO researchers for tracking individual Bluetooth equipment by means of Apple’s crowdsourced Locate My network.

Prevent Data Breaches

By broadcasting new, never ever-witnessed-ahead of public keys each and every 30 seconds from a checklist of 2,000 preloaded community keys via the evidence-of-strategy (PoC) device, it was observed that the mechanism renders the monitoring gadget undetectable, raising no alerts in iOS and Apple’s have Tracker Detect Android application even when undesirable AirTags are present.

Apparently, AirGuard, which was created by SEEMO as a 3rd-party alternate to Tracker Detect, is capable of getting the clone in “guide scan” method, calling into concern the success of the safety and security limitations carried out by Apple to safeguard buyers from the destructive use of AirTags.

“The ubiquitous nature of the Uncover My network, merged with its higher precision and minimal entry price tag, lowers the bar for abuse,” SEEMO researchers Alexander Heinrich, Niklas Bittner, and Matthias Hollick claimed in a new paper, pointing out how “AirGuard observed more precise trackers in various eventualities compared to the iOS tracking detection.”

“Apple desires to incorporate non-genuine AirTags into their menace product, as a result applying security and anti-stalking options into the Uncover My protocol and ecosystem in its place of in the AirTag alone, which can run modified firmware or not be an AirTag at all,” Bräunlein claimed.

Identified this posting exciting? Observe THN on Facebook, Twitter  and LinkedIn to go through far more exceptional content material we publish.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «iranian hackers using new spying malware that abuses telegram messenger Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API
Next Post: Hacking group leaks Nvidia data following alleged ransomware attack hacking group leaks nvidia data following alleged ransomware attack»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.