A New AirTags Hack Leads to a Malicious Site Instead of the Return to Owner Page
ECO-WORTHY 10W Solar Car Battery Charger Maintainer 12V Waterproof Portable Solar Trickle Charger for Car Truck Boat Lawn Mower RV Trailer Tractor ATV Utility Vehicle Battery
$31.99 (as of 22:21 GMT +00:00 - More info)Bateria Power Solar to XT60 Charge Extension Cable 12AWG 10Ft Solar Connector to XT60 Adapter Cable for Solar Panel to LiFePO4 Battery RV Portable Power Station Solar Generator
20% OffNow a security looked into proved its possible to hack an AirTag and alter it to show custom-made sites when phones can its NFC tag.
If you occur upon an AirTag and youre an Android user, you can tap it with NFC to open Apples return page. Which does not assist Apples promise to retrieve your missing out on AirTag in the long run.
Constructed a fast demo: AirTag with customized NFC URL.
( Cables just used for power) pic.twitter.com/DrMIK49Tu0.
— stacksmashing (@ghidraninja) May 8, 2021.
Its still worrying however, and may make you believe twice about scanning that errant AirTag you discovered on the street. Which does not help Apples guarantee to obtain your missing out on AirTag in the long run.
by means of The 8-Bit.
Justin Duino
Apple AirTags arrived with much excitement (and some uneasiness). Weve currently seen teardowns, drill hacks, and even hide-and-seek video games. Now a security researched showed its possible to hack an AirTag and alter it to show custom-made sites when phones can its NFC tag.
That bit may not look like a big offer, however its crucial to keep in mind how AirTags work when you do not have an iPhone. If you discover an AirTag and youre an Android user, you can tap it with NFC to open Apples return page. Ideally, as a Good Samaritan, youll help in returning the device.
With a custom-loaded website, a bad actor could in theory trick a well-meaning person into scanning a tag and opening a harmful website. That could cause destructive results, particularly if the phone in concern isnt fully as much as date.
As found by The 8-Bit, security research study “stacksmashing” posted the proof of concept on Twitter. He handled to get into the AirTags microcontroller, and reflash the gadget to change its NFC site details.
Related Content
- YouTube’s TikTok Rival Shorts Is Going Live for All US Creators Next Week
- Going Green with Solar: The Eco-Friendly Choice for Your Home or Business
- Q&A: What does China’s new Paris Agreement pledge mean for climate change?
- In-depth Q&A: Will China’s emissions trading scheme help tackle climate change?
- Q&A: Can ‘nature-based solutions’ help address climate change?