As reported by Pocketnow, an IT security researcher, who goes by the username stacksmashing on Twitter, managed to get control over Apple’s AirTag object trackers’ microcontroller and modified the underlying software that works when Lost Mode is activated. The hacker then managed to replace the default URL that Apple baked into the AirTag software with his own personal website.
The jailbreak raises questions over the potential ability of malicious hackers to bypass the anti-stalking measures Apple has put in place, and use the AirTags for secretly tracking someone. In a recent investigation by The Washington Post, it was discovered that there are several shortcomings in the anti-stalking toolkit of AirTags and that they can be misused with relative ease.
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.