A New AirTags Hack Leads to a Malicious Site Instead of the Return to Owner Page
Solar Panel for Ring Camera, 2 Pack 4W Solar Charger Compatible with Ring Spotlight &All-New Stick Up Outdoor Cam Battery, 10ft Long Cable with USB-C to Ring Barrel Plug Adapter
$39.99 (as of 18:35 GMT +00:00 - More infoProduct prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on [relevant Amazon Site(s), as applicable] at the time of purchase will apply to the purchase of this product.)NETVUE Solar Panel for Bird Feeder Camera only, Type-C Charger, IP65 Waterproof for Outdoors, Continuously Power Supply, 360° Swivel Bracket
25% OffNow a security looked into proved its possible to hack an AirTag and alter it to show custom-made sites when phones can its NFC tag.
If you occur upon an AirTag and youre an Android user, you can tap it with NFC to open Apples return page. Which does not assist Apples promise to retrieve your missing out on AirTag in the long run.
Constructed a fast demo: AirTag with customized NFC URL.
( Cables just used for power) pic.twitter.com/DrMIK49Tu0.
— stacksmashing (@ghidraninja) May 8, 2021.
Its still worrying however, and may make you believe twice about scanning that errant AirTag you discovered on the street. Which does not help Apples guarantee to obtain your missing out on AirTag in the long run.
by means of The 8-Bit.
Justin Duino
Apple AirTags arrived with much excitement (and some uneasiness). Weve currently seen teardowns, drill hacks, and even hide-and-seek video games. Now a security researched showed its possible to hack an AirTag and alter it to show custom-made sites when phones can its NFC tag.
That bit may not look like a big offer, however its crucial to keep in mind how AirTags work when you do not have an iPhone. If you discover an AirTag and youre an Android user, you can tap it with NFC to open Apples return page. Ideally, as a Good Samaritan, youll help in returning the device.
With a custom-loaded website, a bad actor could in theory trick a well-meaning person into scanning a tag and opening a harmful website. That could cause destructive results, particularly if the phone in concern isnt fully as much as date.
As found by The 8-Bit, security research study “stacksmashing” posted the proof of concept on Twitter. He handled to get into the AirTags microcontroller, and reflash the gadget to change its NFC site details.