This vulnerability with Airtag enables hackers to steal your Apple account


This vulnerability with Airtag enables hackers to steal your Apple account


Toms Guide said it has contacted Apple for comment and will update this story when it receives a response

Researcher says security that "Aertag" ( AirTag ) of the "Apple" (Apple) makes it easy to hunt people and steal their accounts, by leaving the pirates Aertag, when an iPhone user who found him is penetrating his account, according to a report in " toms Gaid (tomsguide).

Airtag is a tracking device developed by Apple that is designed as a key finder, to help people find personal items (such as keys, bags, clothes, small electronic devices and vehicles) when they are lost.

Bobby Rauch, a Boston-area cybersecurity consultant, spoke in a blog for freelance security reporter Brian Krebs about how the hack occurred.

In a series of YouTube clips, Rauch showed how he could use off-the-shelf software to inject invisible text into the phone number field that an AirTag's owner fills in when Apple reports a missing AirTag.

An iPhone user who finds a missing Airtag wirelessly connects their iPhone, which in turn will force the iPhone to open a page on "found.apple.com" for that missing device.

Usually, this page found will contain information about contacting the lost legitimate owner of Airtag. But in this case, the hidden text will secretly redirect the victim's iPhone to a page that looks like the iCloud login page, but will actually be a phishing page ready to steal the victim's Apple username and password.

Rauch told Krebs that he told Apple about this vulnerability last June, but the vulnerability remained on Apple for 3 months while the company was investigating. After 3 months had passed—generally seen as long enough for a security researcher to wait before an uncorrected flaw was detected—Rauch reached out to Krebs.

Krebs contacted Apple for comment, and soon after Apple sent Rauch an email asking him not to discuss the vulnerability publicly. Apparently Rauch refused, telling Krebs that he had not been given a timetable on when the bug would be fixed, whether he would be credited with finding it, or whether he would receive any kind of "bug bounty" at all.

Rauch told Krebs that correcting this problem simply involved blocking some characters from the page's entry fields that were found.

"It's an easy thing to fix," Rauch said. "Having said that, I imagine they (Apple) might also want to know how this was missed in the first place."

Tom's Guide said it has contacted Apple for comment, and will update this story when it receives a response.

How do you avoid this type of attack?
To protect yourself from this type of attack, be aware that you don't need to be signed in to iCloud or your Apple account to report a found Airtag.

You should also enable two-factor authentication to make it difficult to log into your Apple account for an attacker who doesn't own one of your Apple devices, even if that attacker has your Apple username and password.

If you believe your Apple ID has been phishing or otherwise stolen, change your Apple password immediately.

1 Comments

  1. Tom's Guide said it has contacted Apple for comment, and will update this story when it receives a response.

    ReplyDelete
Previous Post Next Post