Airtag hacks - scanning via browser, removing speaker and data exfiltration
Until the Apple Airtag came out a few months ago I hadn’t really looked into the tag tracking market. Turns out there were already quite a lot of offerings available before Apple joined the market, most notably Tile.
However, I wanted to try out the Airtag and ended up ordering a few.
This post will explore three things:
- Removing the speaker of my Airtag
- Using Browser APIs to scan for Airtags (if you don’t have an iPhone but someone tries to stalk you this might be handy)
- Explore data exfiltration via Airtags and Apple’s “Find My” network
By the way, when you order your Airtags online you can customize them. So, I have some cool icons on mine, like this one:
The Airtags have a speaker built in which goes off when they are away from the owner, but following another device for an extended period of time. The time period was actually changed recently from 3 days to I think 8 hours, after privacy concerned articles and blog posts appeared.
Most importantly, a sound will be emitted once the Airtag appears to be following someone.
Removing the speaker
A very obvious hack of course is to remove the speaker, which I was able to do in about 30 seconds using a sharp knife. Please note that this might destroy your Airtag - so know what you do.
This is how the microphone looks like (on the right, next to the main Airtag):
Afterwards no sounds are emitted from the device anymore.
Technically, iPhone users should still be in a good shape as the “Find My Device” app should signal a warning via the app once a stalker Airtag is detected - which might take a few hours.
For Android users the story is different though.
Waiting for an Apple Android App…
Apple has not yet released an Android app - so stalkers can happily go after Android users with little risk of being detected.
The good news is that there are a set of Android apps that show you Bluetooth devices - which is one way to identify Airtags as well that might be in your proximity.
Recent research by the TU Darmstadt contains a lot of useful information regarding the protocol and usage.
Using information from the paper I checked to see if it’s possible to implement a simple Airtag scanner for the browser.
Browsers to the rescue
Turns out that we can also use the browser to scan for Bluetooth device advertisements. In particular Chrome 92+ (currently in beta for Android users) supports requestDevice
and filtering via a dataPrefix
.
The code I stitched together looks like this:
navigator.bluetooth.requestDevice({
filters: [{ manufacturerData: [
{
companyIdentifier: 0x004c, // Apple
dataPrefix: new Uint8Array([0x12]) // Airtag
}],
optionalServices: ['battery_service']
}]
})
A simple webpage to check for Airtags is hosted here.
Note: It requires Chrome 92+ (currently in beta for Android users) to work. Sometimes it seems flacky. I’m not sure exactly how frequently an Airtag emits its Bluetooth advertisement. During experiements it seemed that advertisements are only starting to happen after an iPhone using “Find My” NFC is close by. Overall, this needs more testing.
Above you can see a scan run on my Android device which shows that two Airtags are close by.
Novel Data Exfiltration
One thing I was wondering if Apple’s Airtag/device tracking network can be used to beaconing out arbitrary data.
The idea would be to piggy-back on Apple’s “Find My” network (offline finding) to do so. Turns out that this is totally possible via fake Airtag Bluetooth advertisements.
The TU Darmstadt published a toolset called OpenHayStack and there was another article I found about a tool call send-my.
All that is needed seems to have a simple Windows app that performs Bluetooth advertisements according to the two articles above to send data out via nearby Airtags.
This will be one of my upcoming weekend projects. :)
Conclusion
Airtags and other tracking devices enable stalkers, and its quite scary how easy a stalking device can be created. Let’s hope that we soon see more common frequency tracking apps that can raise alerts, ideally built into the Operating Systems.
It’s also worth keeping an eye on potential data exfiltration attacks that seem possible via Airtags, although throughput appears quite limited.
Cheers, @wunderwuzzi23