Apple Find My hack turns any Bluetooth device into a secret AirTag — what we know
Well this is absolutely terrifying

Apple’s Find My network is an incredibly useful bit of software, giving users a way to track down their missing devices and accessories — including AirTags, iPhones and even certain kinds of headphones.
Unfortunately, it may not have been quite as secure as Apple had hoped, thanks to a serious exploit that was uncovered by researchers at George Mason University.
According to researchers this exploit would have allowed hackers to turn any Bluetooth device into an AirTag "without the opener ever realizing it." This would essentially let hackers track users through the Find My network without them realizing, and without the usual protections Apple has in place against AirTag stalking.
How this exploit works
Normally AirTags are designed to change their Bluetooth address based on a specific cryptographic key. Unfortunately researchers were able to develop a system that could find keys for those Bluetooth addresses, aided by “hundreds” of GPUs that could calculate a key match.
Dubbed “nRootTag,” this exploit had a frighteningly high success rate of 90% and was able to track down devices “within minutes.”
One experiment even saw researchers track the location of a computer within 10 feet, and they were later able to trace a moving e-bike as it was ridden on city streets. Another experiment let them recreate the path of a person’s flight by tracking a games console.
Proximity wasn’t a factor either, with hackers able to do all this from thousands of miles away.
Sign up to get the BEST of Tom's Guide direct to your inbox.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
As terrifying as it is that hackers could track your location so easily (or sell access to others), researchers pointed out that it could go much further than that. “While it is scary if your smart lock is hacked, it becomes far more horrifying if the attacker also knows its location. With the attack method we introduced, the attacker can achieve this.”
What happens next?
The George Mason team informed Apple of this exploit last July. While Apple acknowledged the work of the team in the iOS 18.2 release notes, the exploit hasn’t actually been fixed yet — nor has Apple addressed how it will fix the problem. The problem is that even if Apple were to develop a fix tomorrow, the research team noted it may take years to roll out to everyone — because it can’t force people to install updates.
It’s not clear whether this exploit has actually been utilized by bad actors, but the fact it exists is frightening enough. Researchers advise that until an update can be developed, users stay cautious about granting apps Bluetooth permissions.
They should also keep software up to date and “consider privacy-focused operating systems for better protection against prying eyes.”
More from Tom's Guide
Tom is the Tom's Guide's UK Phones Editor, tackling the latest smartphone news and vocally expressing his opinions about upcoming features or changes. It's long way from his days as editor of Gizmodo UK, when pretty much everything was on the table. He’s usually found trying to squeeze another giant Lego set onto the shelf, draining very large cups of coffee, or complaining about how terrible his Smart TV is.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.