Summary

  • A website and research paper detail how devices can pretend to be an AirTag, using local code execution to harness the AirTag infrastructure.
  • This could allow an attacker to escalate privileges on a device and make it trackable.
  • This method could also be used to steal personal data, such as checking mail tracking, without needing connectivity.
  • The researchers claim the specific vulnerabilities that allow this have been patched in the most recent iOS and macOS updates, but emphasise that an attacker would need local access to devices to exploit these flaws.
  • This reveals the importance of keeping all devices up to date with the latest updates and patches.

By Arya Voronova

Original Article