News of the day Apple released the AirTag tracker last month. Now, the security researcher has been able to hack the device and demonstrated his process of modifying the NFC URL in “lost mode”. It is equivalent to completing the jailbreak of AirTag, and the hacker can do whatever he wants.
German security researcher Stack Smashing tweeted today that he was able to hack AirTag‘s microcontroller and modify AirTag’s firmware, and released a demo video of modifying the NFC URL.
A microcontroller is an integrated circuit (IC), and smart devices usually control the device through a micro-processing unit, memory, and other peripherals.
According to AllAboutCircuits, “These devices are optimized for embedded applications that require processing functions and fast, responsive interaction with digital, analog, or electromechanical components.”
In the video, he compares the regular AirTag with the cracked version of AirTag. When the cracked AirTag tracking program opens “Find Me”, it will open a URL set by the hacker, which can be used for phishing or any other intrusion operations.
Apple has not yet responded, but fortunately, a white hat found this loophole in the early stage and hopes that Apple can formulate countermeasures as soon as possible.