Metacurity

Share this post

Security Researcher Successfully Hacked Apple's Just-Released AirTag

metacurity.substack.com

Security Researcher Successfully Hacked Apple's Just-Released AirTag

City of Tulsa shutters systems following a ransomware attack, CISA publishes analysis of Five Hands ransomware, US and UK intel agencies publish details on SVR's hacking techniques, more

Cynthia Brumfield
May 10, 2021
∙ Paid
1
Share
Share this post

Security Researcher Successfully Hacked Apple's Just-Released AirTag

metacurity.substack.com

Please take a look at my column today for CSO Online that examines the OT cybersecurity implications of the Colonial Pipeline ransomware attack. For more on that attack, check out our special report on this major development.

German security researcher Stack Smashing said he was able to break into the microcontroller of Apple’s just-released AirTag and modify elements of the item tracker software.

The researcher was able to modify the AirTag NFC URL for Lost Mode to open a non-related URL, which miscreants could use for phishing or other malicious activity. It remains to be seen if Apple can implement a server-side blocking mechanism to prevent a modified AirTag from accessing the Find My Network. (José Adorno / 9to5Mac)

Related: iDownloadBlog.com, 9to5Mac, AppleInsider, Slashdot, iPhone Hacks, Macworld, Macworld, Times of India, Ubergizmo, iDownloadBlog.com, WCCFtech, SlashGear » security, Slashdot, The 8-bit

Keep reading with a 7-day free trial

Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
Previous
Next
© 2023 DCT Associates
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great writing