

The company keeps making stupid mistakes and pushing half-assed patches for things that should have been secure at launch.
#Facebook hacking machine update#
Apple doesn’t need to push an update for the iPhone or AirPods it just needs to make the webpage sanitize incoming “phone numbers.” But I hope that Apple takes the steps to completely resolve this problem. Technically speaking, this should be a very easy fix. Still, Apple has not commented on the issue publicly, though it previously told Rauch that it intends to fix the problem. He warned the company that he’d take the vulnerability public after 90 days, and finally did so in a Medium blog post. The company spent three months telling Rauch that it was investigating the issue, and refused to tell him if he would receive credit or a bounty for his discovery (these are standard rewards for following Apple’s bug bounty program).Īpple asked Rauch not to “leak” the bug, but refused to work with him or provide a timeline for a patch.

Apple’s Spent Months Sitting On Its Handsīobby Rauch, the researcher who discovered this vulnerability, reported it to Apple on June 20th. These exploits could crash or brick your iPhone, but to be fair, such an exploit wouldn’t really benefit a hacker (and there are much easier ways to deliver such exploits). Hackers could also use this vulnerability to trigger browser-based zero-day exploits on an iPhone. They could then plant this AirTag near a victim’s car or front door to ensure that it’s discovered and scanned. A hacker can program a fake iCloud login box to show up when their “lost” AirTag is scanned, for example. This vulnerability makes targeted phishing attempts extremely easy.
#Facebook hacking machine full#
So if a lost AirTag’s phone number field is full of malicious XSS code, the Apple website will embed it, no questions asked. Your iPhone then embeds the “phone number” in a webpage. When you scan a lost AirTag, it gives its owner’s “phone number” to your iPhone.

You can stick anything in this entry field, including malicious code.Īnd that’s a big problem. As discovered by security researcher Bobby Rauch, Apple doesn’t sanitize the phone number entry field that AirTag owners fill out when setting up their trackers. Unfortunately, a design flaw in AirTags could turn the trackers into cheap tools for drop attacks.

Scanning is easy-you just touch the AirTag with your iPhone. That’s why AirTags have a “lost mode,” a setting that lets Good Samaritans scan the tracker to see its owner’s phone number. If someone loses their AirTag-equipped bag, they can track its location using the Find My network, which is anonymously powered by iPhones and other Apple devices.īut more often than not, lost articles are found by strangers. AirTags Don’t Sanitize “Phone Numbers”ĪirTags are small trackers that attach to backpacks, purses, luggage, and other valuables. Last week, we learned that the company patched a macOS exploit in the laziest way possible, and now, the company is facing backlash for an amateurish AirTags vulnerability that it’s known about for months and never bothered to fix. Apple’s latest security issues are both devastating and laughable.
