Jump to content
  • Sign Up
×
×
  • Create New...

Apple’s Find My Network Could Be Exploited to Send Text Messages to Nearby Devices, Security Researcher Finds


Recommended Posts

  • Diamond Member



Apple’s Find My Network Could Be Exploited to Send Text Messages to Nearby Devices, Security Researcher Finds

Apple’s Find My network could be exploited to broadcast arbitrary messages to nearby Apple devices, a security researcher has found. The network is formally meant to help people find their lost items. It is claimed to have “industry leading security” as well as end-to-end encryption. However, research shows that the Find My network can enable a way to send any text messages — and not location details — to nearby devices including iPhone, iPad, and Mac.

Security researcher Fabian Bräunlein has

This is the hidden content, please
a loophole that allows exploitation of the Find My network protocol to send normal text messages to nearby devices. The researcher was able to transmit text messages by replicating the way an AirTag communicates over the crowdsourced network and sends its GPS coordinates as an encrypted message.

Bräunlein took reference from a recent

This is the hidden content, please
conducted by Germany’s Technical University (TU) of Darmstadt that was aimed to help developers build accessories for the Find My network. After understanding the protocol powering the network, the researcher developed a custom device with a microcontroller running a proprietary firmware to transmit the message. He also built a custom Mac app to decode and display the message from the device.

The proof-of-concept created by Bräunlein essentially replaces the location data that the Find My network normally broadcasts with text strings.

It is unclear at this moment whether the model developed by the researcher could be used to circulate malicious content over the Find My network. However, the extensive research conducted by Bräunlein shows that the protocol used by Apple could be moulded to broadcast not location data but content such as text messages.

Earlier this week, a ******* security researcher reported that the Apple AirTag could be hacked to replace the default Find My link with a custom link for NFC readers. This manipulation was similar in nature to what has now been found on the Find My network.


We ***** into all things Apple — iPad Pro, iMac, Apple TV 4K, and AirTag — this week on Orbital, the Gadgets 360 podcast. Orbital is available on
This is the hidden content, please
,
This is the hidden content, please
,
This is the hidden content, please
, and wherever you get your podcasts.

Affiliate links may be automatically generated – see our ethics statement for details.

Comments

For the latest tech news and reviews, follow Gadgets 360 on

This is the hidden content, please
,
This is the hidden content, please
,
This is the hidden content, please
,
This is the hidden content, please
and
This is the hidden content, please
. For the latest videos on gadgets and tech, subscribe to our
This is the hidden content, please
. If you want to know everything about top influencers, follow our in-house
This is the hidden content, please
on
This is the hidden content, please
and
This is the hidden content, please
.

Samsung Galaxy F02s, Galaxy M02s Receive Android 11-Based One UI 3.1 Core Update in India: Reports







This is the hidden content, please

apple find my network exploit broadcast text messages nearby devices iphone ipad mac apple find my network,find my network,find my,apple,iphone,ipad,mac
#Apples #Find #Network #Exploited #Send #Text #Messages #Nearby #Devices #Security #Researcher #Finds

This is the hidden content, please

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.