Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Jessica Jones is back: Krysten Ritter to appear in Daredevil: Born Again season 2

14 May 2025

Watch Tesla’s humanoid robot pulling some snappy dance moves

13 May 2025

The Beats Studio Buds+ are only $100 this week — 41% off!

13 May 2025

Huawei Nova 14 Series Launch Date Announced, Confirmed to Include New Ultra Variant

13 May 2025

10 best Tom Cruise movies, ranked

13 May 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Apple’s Find My Network Flaw Enables Silent AirTag-Like Tracking of Any Bluetooth Device
Mobiles

Apple’s Find My Network Flaw Enables Silent AirTag-Like Tracking of Any Bluetooth Device

By technologistmag.com27 February 20253 Mins Read
Share
Facebook Twitter Reddit Telegram Pinterest Email

Apple’s Find My network can be used by hackers to track any device with Bluetooth connectivity by turning them into homing beacons like the company’s AirTag, according to researchers. A malicious user could trick Apple’s Find My network into tracking a smartphone, laptop, or any internet of things (IoT) device using its Bluetooth address, by tricking the network into thinking it is an AirTag. The exploit can be used to pinpoint the location of a device, or track it as it moves across a specific area.

Tricking the Find My Network Into Tracking Ordinary Bluetooth Devices

According to George Mason University researcher Junming Chen, the Apple’s Find My network contains a Bluetooth vulnerability that would allow a hacker to silently track a device by using its Bluetooth address. Dubbed ‘nRootTag’, this attack tricks the Find My network into thinking that a device is a lost AirTag.

A team of four researchers led by Chen discovered that the nRootTag attack could be used to identify the location of a Bluetooth connected device with an accuracy of 10 feet (3.05 metres). It could also be used to locate a larger object, such as an e-bike, and track it as it moved around a city. The team also highlighted that the flaw could also be misused to identify the location of smart locks that have been hacked, enabling attackers to easily find them.

While Apple protects user privacy on an AirTag by changing its Bluetooth address using a cryptographic key, this process requires elevated privileges. In order to circumvent this, the researchers used hundreds of GPUs to identify a key that is compatible with the Bluetooth address of a device, and making it adapt to the address.

The use of several rented GPUs offers an affordable method to quickly identify the location of a device “within minutes”. nRootTag has a 90 percent success rate, according to the researchers, who say that advertising companies could avoid the use of GPS and track or profile users with this technique.

While Apple’s network was designed to track the company’s own devices, the researchers were able to use nRootTag to track mobile devices, laptops, IoT devices, smart TVs, and even virtual reality (VR) headsets. They will present these findings at the USENIX Security Symposium in August.

The researchers contacted Apple about the security flaw in July 2024, and the company acknowledged their contribution in the release notes for iOS 18.2, which was released in December (see the Proximity section).

However, a proper fix for the issue — whenever it is released by Apple — would likely require an update to the Find My network, and might be delayed by users who defer the installation of software updates on their devices. The researchers state that the vulnerability in the Find My network could exist for years, until these outdated devices slowly “die out”.

Users can take some precautions to keep their devices safe from tracking, such as being judicious while granting apps access to the Bluetooth permission or making sure that their devices are up-to-date. The researchers also recommend the use of privacy focused operating systems that could potentially protect user privacy.

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleThe Best Hair Dryers That Put Your Old One to Shame
Next Article DeepSeek Rushes to Launch New AI Model as China Goes All In

Related Articles

Huawei Nova 14 Series Launch Date Announced, Confirmed to Include New Ultra Variant

13 May 2025

Bluetooth 6.1 Announced With Support for Enhanced Privacy, Better Battery Life

13 May 2025

Meizu Note 16 Pro With 6,200mAh Battery, Snapdragon 7s Gen 3 Launched Alongside Note 16: Price, Specifications

13 May 2025

Google Announces New Android Security and Privacy Features to Protect Users from Scams and Attacks

13 May 2025

Google to Add New Security Features to Advanced Protection With Android 16

13 May 2025

Honor 400 Series to Feature an AI-powered Image-to-Video Generator, Reportedly Powered by Google

13 May 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss

Watch Tesla’s humanoid robot pulling some snappy dance moves

By technologistmag.com13 May 2025

Tesla has shared a new video showing its Optimus humanoid robot pulling some rather impressive…

The Beats Studio Buds+ are only $100 this week — 41% off!

13 May 2025

Huawei Nova 14 Series Launch Date Announced, Confirmed to Include New Ultra Variant

13 May 2025

10 best Tom Cruise movies, ranked

13 May 2025

Bluetooth 6.1 Announced With Support for Enhanced Privacy, Better Battery Life

13 May 2025
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2025 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.