Apple gadgets allowed to monitor people

Apple ecosystem vulnerability allowed to monitor gadgets around the world

University specialists George Mason (USA) revealed a vulnerability that allows hackers to follow almost any gadgets in the world using the Apple ecosystem. The results of the study are published on the organization’s website.

Exploit was called Nroottag. With the help of vulnerabilities, hackers can deceive the Find My (“Locator”) network, created for remote search for Apple gadgets. Specialists used the computing resources of their computers and were able to track the exact location of the selected PC with an accuracy of three meters.

On the Locator network, all Apple gadgets are constantly divided with each other. Thanks to this, the user of the lost iPhone, Mac or other brand device will be able to track its whereabouts. Apple assures that the devices exchange information on the protected channel. American researchers have learned to manipulate cryptographic keys in order to give out any gadget in theory for the Airtag beacon connected to the Find My network.

Materials on the topic:

During the experiment, specialists managed to track the location of a conditional computer with an accuracy of three meters. They also managed to unload the history of his movements. The authors noted that Nroottag does not require the physical presence of a hacker – he can perform all actions remotely. The probability of hacking as a result of controlled attacks was more than 90 percent.

At the same time, experts noted that significant computing power is required to hack and process data. So, they used hundreds of graphic processors to quickly search for the corresponding cryptographic keys. Experts talked about the problem of Apple in the summer of 2024 – in the corporation they thanked scientists for the find and promised to correct the vulnerability.

At the end of February, the Apple Corporation disconnected the function of improved ICLUD user data in the UK. Bloomberg journalists believe that this happened due to the requirements of the British authorities to open access to the cloud storage of their citizens.

Source: Lenta

You may also like

Immediate Access Pro