Security Researcher Uses Apple’s Find My Network to Send Messages Via AirTags

Security researchers have used AirTag’s Find My network to send messages without Apple’s knowledge.

A security researcher from Positive Security, Fabian Bräunlein, published a blog post detailing how the Find My network can be exploited to send messages and other data. Bräunlein was able to work out a way to turn the Find My network into a data transfer mechanism, using the local devices to upload that data.

Bräunlein says “it’s possible to upload arbitrary data from non-internet-connected devices” with the help of Find My broadcasts. Any Apple device in the vicinity can pick up the message and bounce it off to the recipient, very similar to how one can track items using AirTag.

Apple’s network is designed to utilize the active iOS base to serve as individual nodes that can transfer location data. The blog post on how the researcher achieved the feat is pretty in-depth, but it starts with an AirTag.

According to the researcher, it’s possible to emulate the way the AirTag not only connects to the Find My network and also broadcast its location. Interestingly, messages sent on the Find My network are encrypted, too, because the location data (which is encrypted) is replaced with the message.

Bräunlein included a practical demonstration of how it all works on the blog post:

  1. When paring an AirTag with an Apple Device, an Elliptic Curve key pair is generated and the public key is pushed to the AirTag (and a shared secret to generate rolling public keys)
  2. Every 2 seconds, the AirTag sends a Bluetooth Low Energy broadcast with the public key as content (changes every 15 minute deterministically using the previously shared secret)
  3. Nearby iPhones, Macbooks, etc. recognize the Find My broadcast, retrieve their current location, encrypt the location with the broadcasted public key (using ECIES) and upload the encrypted location report
  4. During device search, the paired Owner Device generates the list of the rolling public keys that the AirTag would have used in the last days and queries an Apple service for their SHA256 hashes. The Apple backend returns the encrypted location reports for the requested key ids
  5. The Owner Device decrypts the location reports and shows an approximate location

Check out the entire proof on concept over at Positive Security’s blog.

P.S. Help support us and independent media here: Buy us a beer, Buy us a coffee, or use our Amazon link to shop.