By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Critical Find My vulnerability transforms any Bluetooth device into a tracker
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Critical Find My vulnerability transforms any Bluetooth device into a tracker
News

Critical Find My vulnerability transforms any Bluetooth device into a tracker

News Room
Last updated: 2025/02/28 at 2:20 AM
News Room Published 28 February 2025
Share
SHARE

George Mason University researchers found a critical vulnerability in Apple’s Find My service that can transform any Bluetooth device into a tracker without the device owner’s knowledge or consent. While many exploited vulnerabilities require physical access, this can be performed remotely, adding an extra layer of concern.

According to the researchers (via MacRumors), the “nRootTag” attack uses a Bluetooth address combined with the Find My network to turn other devices into homing beacons.

“It’s like transforming any laptop, phone, or even gaming console into an Apple AirTag – without the owner ever realizing it,” said Junming Chen, lead author of the study. “And the hacker can do it all remotely, from thousands of miles away, with just a few dollars.” 

As explained in the paper, Apple’s AirTags send Bluetooth signals anonymously to nearby Apple devices. Hackers can turn any device into an AirTag so they can track the user. To replicate this attack, the researchers were able to map a computer’s location to within 10 feet, track a moving e-bike route, as well as reconstruct a flight path and identify a flight number thanks to a gaming console brought on an airplane.

Sign up for the most interesting tech & entertainment news out there.

By signing up, I agree to the Terms of Use and have reviewed the Privacy Notice.

“While it is scary if your smart lock is hacked, it becomes far more horrifying if the attacker also knows its location. With the attack method we introduced, the attacker can achieve this,” says one researcher.

They explain that the hackers were able to develop “efficient key search techniques to find a key that is compatible with a Bluetooth address, making the key adapt to the address” instead of modifying the AirTag’s Bluetooth address.

With a 90% success rate and the ability to track devices within minutes, the real issue is that this could be used to stalk people or even by advertising companies that want to profile users without using the phone’s GPS functionality.

The paper says Apple has been aware of the issue for almost a year, but the company has not patched it yet. Even when it can fix this issue, the researchers believe it might continue to be an issue, as many users take weeks or months to update their phones.

BGR will let you know once the company fixes this Find My vulnerability.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Deepseek vs ChatGPT: The AI Battle You Need to Know in 2025!
Next Article Inside Our Creator Club Event with TikTok
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Alzheimer’s starts long before its symptoms. And we have discovered one of its first mechanisms
Mobile
Bloodied Muhammad LOSES belt to Maddalena as Aussie scuppers UFC mega-fight
News
Top 10 Custom Software Development Companies to Hire in 2025
Gadget
Egypt’s Nawy, the largest proptech in Africa, lands a $52M Series A to take on MENA | News
News

You Might also Like

News

Bloodied Muhammad LOSES belt to Maddalena as Aussie scuppers UFC mega-fight

4 Min Read
News

Egypt’s Nawy, the largest proptech in Africa, lands a $52M Series A to take on MENA | News

7 Min Read
News

From ‘Skytanic’ to bizarre ‘blended wing’ jet – 5 planes of we could see by 2030

6 Min Read
News

Chase Bank Is Now Blocking Some Zelle Charges. Here's How You Can Send Money Instead

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?