{"id":23957,"date":"2025-03-28T04:46:19","date_gmt":"2025-03-28T08:46:19","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23957"},"modified":"2025-03-28T12:52:46","modified_gmt":"2025-03-28T08:52:46","slug":"protecting-from-tracking-via-findmy-airtag","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/23957\/","title":{"rendered":"How to track anyone via the Find My network"},"content":{"rendered":"<p>AirTags are a popular tracking device used by anyone from forgetful key owners to those with malicious intent, such as <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-stalking-with-airtag\/43705\/\" target=\"_blank\" rel=\"noopener nofollow\">jealous spouses<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-find-airtag-and-other-location-trackers-on-android-2024\/51908\/\" target=\"_blank\" rel=\"noopener nofollow\">car thieves<\/a>. Using AirTags for spying is simple: a tag is discreetly placed on the target to allow their movements to be conveniently monitored using <strong>Apple Find My<\/strong>. We\u2019ve even added <a href=\"https:\/\/www.kaspersky.com\/blog\/airtag-and-stalkerware-protection-on-android\/52652\/\" target=\"_blank\" rel=\"noopener nofollow\">protection from AirTag-based tracking<\/a> to our <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">products for Android<\/a>.<\/p>\n<p>But a recent <a href=\"https:\/\/cs.gmu.edu\/~zeng\/papers\/2025-security-nrootgag.pdf\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a> by security researchers has surprisingly found that remote tracking doesn\u2019t even depend on buying an AirTag or ever being physically near the target. If you manage to sneak special malware onto someone\u2019s Windows, Android, or Linux device (like a computer or phone), it could use the device\u2019s Bluetooth to send out a signal that nearby Apple devices would think is coming from an AirTag. Essentially, for Apple devices, the infected phone or computer effectively becomes an oversized AirTag \u2013 trackable via the <strong>Find My<\/strong> network, which boasts over a billion Apple phones and tablets.<\/p>\n<h2>Anatomy of the attack<\/h2>\n<p>The attack exploits two features of the <strong>Find My<\/strong> technology.<\/p>\n<p>Firstly, this network uses end-to-end encryption \u2013 so participants don\u2019t know whose signals they\u2019re relaying. To exchange information, an AirTag and its owner\u2019s phone rely on a pair of cryptographic keys. When a lost AirTag broadcasts its \u201ccallsigns\u201d via Bluetooth, <strong>Find My<\/strong> network \u201cdetectors\u201d (that is, any Apple device with Bluetooth and internet access, regardless of who owns it) simply transmit AirTag\u2019s geolocation data to Apple servers. The data is encrypted with the lost AirTag\u2019s public key.<\/p>\n<p>Then, any device can ask for the encrypted location data from the server. And because it\u2019s encrypted, Apple doesn\u2019t know who the signal belongs to, or which device asked for it. The crucial point here is that one can only decrypt the data and find out both whose AirTag it is and its exact location by having the corresponding private key. Therefore, this data is only useful to the owner of the smartphone paired with this AirTag.<\/p>\n<p>Another feature of <strong>Find My<\/strong> is that detectors don\u2019t verify whether the location signal indeed originated with an Apple device. Any devices that support Bluetooth Low Energy (BLE) can broadcast it.<\/p>\n<p>To exploit these features, the researchers came up with the following method:<\/p>\n<ol>\n<li>They install malware on a computer, phone, or some other device running Android, Windows, or Linux, and check the Bluetooth adapter address.<\/li>\n<li>The attackers\u2019 server receives the information and uses powerful video cards to generate a pair of encryption keys specific to the device\u2019s Bluetooth address and compatible with Apple\u2019s <strong>Find My<\/strong><\/li>\n<li>The public key is sent back to the infected device, and the malware then starts transmitting a Bluetooth message that mimics AirTag signals and includes this key.<\/li>\n<li>Any nearby Apple device connected to the internet receives the Bluetooth message and relays it to the <strong>Find My<\/strong><\/li>\n<li>The attackers\u2019 server uses the private key to request the location of the infected device from <strong>Find My<\/strong> and decrypt the data.<\/li>\n<\/ol>\n<h2>How well does the tracking work?<\/h2>\n<p>The more Apple devices nearby and the slower the victim\u2019s movement, the better the accuracy and speed of the location tracking. In typical urban environments like homes or offices, the location is typically pinpointed within six to seven minutes and with an accuracy of around three meters. Even in extreme situations, such as being on an airplane, tracking can still occur because internet access is now widely available on flights. The researchers obtained 17 geolocation points throughout a 90-minute flight, allowing them to reconstruct the aircraft\u2019s flight path quite accurately.<\/p>\n<p>Naturally, the success of the attack hinges on whether the victim can be infected with malware, and the details are slightly different depending on the platform. On Linux devices, the attack only requires infecting the victim\u2019s gadget due to the specific Bluetooth implementation. By contrast, Android and Windows employ Bluetooth address randomization, meaning the attacker needs to infect two nearby Bluetooth devices: one as the tracking target (the one that mimics an AirTag), and another to obtain its adapter address.<\/p>\n<p>The malicious application needs Bluetooth access, but this isn\u2019t hard to get. Many common app categories \u2013 like media players, file sharing tools, and even payment apps \u2013 often have legitimate reasons to request it. It\u2019s likely that a convincing and functional bait application will be created for this type of attack, or even that an <a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\">existing application will be trojanized<\/a>. The attack requires neither administrative permissions nor root access.<\/p>\n<p>Importantly, we\u2019re not just talking about phones and computers: the attack is effective across a range of devices \u2013 including smart TVs, virtual-reality glasses, and other household appliances \u2013 as Android and Linux are common operating systems in many of them.<\/p>\n<p>Another key part of the attack involves calculating cryptographic keys on the server. Due to the complexity of this operation \u2013 which requires leasing hardware with modern video cards \u2013 the cost of generating a key for a single \u00a0victim is estimated at around $2.2. For this reason, we find mass-tracking scenarios that target, say, visitors inside a shopping center, to be unlikely. However, targeted attacks at this price point are accessible to virtually anyone, including scammers or nosy co-workers and spouses.<\/p>\n<h2>Apple\u2019s response<\/h2>\n<p>The company patched the <strong>Find My<\/strong> network vulnerability in December 2024 in iOS 18.2, visionOS 2.2, iPadOS 17.7.3 (for older devices) and 18.2 (for newer ones), watchOS 11.2, tvOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2, and macOS Sequoia 15.2. Unfortunately, as is often the case with Apple, the details of the updates have not been disclosed. The researchers <a href=\"https:\/\/nroottag.github.io\/\" target=\"_blank\" rel=\"nofollow noopener\">emphasize<\/a> that this tracking method will remain technically feasible until all Apple users update to at least the above versions, though fewer devices will be able to report a tracked device\u2019s location. And it\u2019s not impossible that the Apple patch could be defeated by another engineering trick.<\/p>\n<h2>How to protect yourself from the attack<\/h2>\n<ul>\n<li>Turn off Bluetooth when you\u2019re not using it if your device has the option.<\/li>\n<li>When installing apps, stick to trusted sources only. Verify that the app has been around for a long time, and has many downloads and a high rating in its latest version.<\/li>\n<li>Only grant Bluetooth and location access to apps if you\u2019re certain you need those features.<\/li>\n<li>Regularly update your device: both the OS and main apps.<\/li>\n<li>Make sure you have comprehensive malware protection enabled on all your devices. We recommend <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>.<\/li>\n<\/ul>\n<blockquote><p>Besides this rather unusual and as-yet-unseen-in-the-wild tracking method, there are numerous other ways your location and activities can be tracked. What methods are being used to spy on you? Read these for the details:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/disable-mobile-app-ad-tracking\/53096\/\" target=\"_blank\" rel=\"noopener nofollow\">How smartphones build a dossier on you<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/webcam-stalking\/52733\/\" target=\"_blank\" rel=\"noopener nofollow\">Webcam stalking: fact or fiction?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/airtag-and-stalkerware-protection-on-android\/52652\/\" target=\"_blank\" rel=\"noopener nofollow\">How to protect yourself from Bluetooth stalking and more<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tracking-and-hacking-kia-cars-via-internet\/52497\/\" target=\"_blank\" rel=\"noopener nofollow\">How millions of Kia cars could be tracked<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part1-common\/52403\/\" target=\"_blank\" rel=\"noopener nofollow\">Run for your data: privacy settings in jogging apps<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/car-manufacturers-silently-sell-user-telematics-data\/51245\/\" target=\"_blank\" rel=\"noopener nofollow\">I know how you drove last summer<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/geolocation\/\" target=\"_blank\" rel=\"noopener nofollow\">\u2026 and other posts<\/a>.<\/p><\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Apple&#8217;s Find My network can be exploited to remotely track other vendors&#8217; Android, Windows, and Linux devices.<\/p>\n","protected":false},"author":2722,"featured_media":23958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[2545,105,14,2226,22,1061,43,738,521,783],"class_list":{"0":"post-23957","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-airtag","9":"tag-android","10":"tag-apple","11":"tag-geolocation","12":"tag-google","13":"tag-ios","14":"tag-privacy","15":"tag-surveillance","16":"tag-threats","17":"tag-tracking"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/23957\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protecting-from-tracking-via-findmy-airtag\/28718\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/12348\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/30692\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protecting-from-tracking-via-findmy-airtag\/28835\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/28017\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/protecting-from-tracking-via-findmy-airtag\/30862\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/protecting-from-tracking-via-findmy-airtag\/29567\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/protecting-from-tracking-via-findmy-airtag\/39310\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/protecting-from-tracking-via-findmy-airtag\/13242\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/53245\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/protecting-from-tracking-via-findmy-airtag\/22688\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/protecting-from-tracking-via-findmy-airtag\/32048\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/protecting-from-tracking-via-findmy-airtag\/28988\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting-from-tracking-via-findmy-airtag\/34782\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting-from-tracking-via-findmy-airtag\/34413\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/airtag\/","name":"AirTag"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23957"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23957\/revisions"}],"predecessor-version":[{"id":23959,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23957\/revisions\/23959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23958"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}