Is your iPhone spying on you? The “nRootTag” vulnerability turns your device into a snoop.

The announcement of the iPhone 16 has generated excitement, but a shadow looms over the Apple ecosystem. As rumors swell around the upcoming MacBook Air M4 and AirTag 2, an alarming discovery raises doubts: a major security flaw, dubbed “nRootTag,” threatens to turn our devices into spy tools. How can a simple Bluetooth address become a gateway for hackers? Let’s dive into this vulnerability that could change our relationship with technology.

How “nRootTag” Uses Your Locator Network Against You

Researchers at George Mason University have uncovered a troubling flaw within Apple’s Locator network. This vulnerability, named “nRootTag,” allows malicious individuals to locate any connected device, whether it’s a computer, smartphone, or even a gaming console. The principle is simple yet alarmingly effective: by exploiting a device’s Bluetooth address and relying on the Locator network, hackers are able to simulate the presence of a lost AirTag. Thus, the targeted device emits Bluetooth signals, relayed by nearby Apple devices, allowing it to be located with chilling accuracy.

airtag

Chilling Location Accuracy

The experiments conducted by the researchers are enlightening. They were able to locate a computer to within three meters, track the movement of an electric bike in real-time, and even reconstruct the trajectory of a gaming console transported on an airplane by identifying its flight number. This accuracy, combined with a success rate of 90%, raises serious questions about the protection of our privacy. Professor Qiang Zeng emphasizes: “If hacking your smart lock is frightening, it’s even worse if the attacker also knows its location.”

AirPods Pro 2: the hearing aid approved in the UK. France is lagging behind.

Consequences That Go Beyond Simple Location

The “nRootTag” vulnerability is not limited to simple localization. It paves the way for other forms of hacking, such as accessing sensitive data or gaining remote control of devices. Imagine a hacker being able to locate your laptop and know your movement habits. They could then use this information to steal your banking details, spy on your conversations, or even track you without your knowledge. The possibilities are vast and the consequences potentially disastrous.

Alerted as early as July 2024, Apple has committed to fixing this flaw in its future updates. However, Junming Chen believes it will take several years for all affected devices to receive the necessary patches. In the meantime, it is crucial to remain vigilant. Researchers recommend being wary of applications that request Bluetooth access and keeping devices updated. Caution is warranted, as even the newest devices are not immune.