Find My Network Exploited to Send Messages

An exploit allows messages and additional data to be sent across Apple's Find My network, according to the findings of a security researcher.

apple findmy network feature
Security researcher Fabian Bräunlein has found a way to leverage Apple's ‌Find My‌ network to function as a generic data transfer mechanism, allowing non-internet-connected devices to upload arbitrary data by using nearby Apple devices to upload the data for them.

The ‌Find My‌ network uses the entire base of active iOS devices to act as nodes to transfer location data. Bräunlein explained in an extensive blog post that it is possible to emulate the way in which an AirTag connects to the ‌Find My‌ network and broadcasts its location. The ‌AirTag‌ sends its location via an encrypted broadcast, so when this data is replaced with a message, it is concealed by the broadcast's encryption.

find my network message exploit
Bräunlein's practical demonstration showed how short strings of text could be sent from a microcontroller running custom firmware over the ‌Find My‌ network. The text was received via a custom Mac app to decode and display the uploaded data.

It is not immediately clear if this ‌Find My‌ network exploit could be used maliciously or what useful purposes it may serve. Nonetheless, it seems that it could be difficult for Apple to prevent this unintended use due to the privacy-focused and end-to-end encrypted nature of the system.

For more information, see Bräunlein's full blog post, which explains in detail the entire technical process behind passing arbitrary data through the ‌Find My‌ network.

Popular Stories

16 pro

Apple Announces iPhone 16 Pro and iPhone 16 Pro Max with Larger Displays, New Camera Control, and More

Monday September 9, 2024 11:13 am PDT by
Apple today announced the iPhone 16 Pro and iPhone 16 Pro Max—its latest flagship smartphones—featuring larger displays, an all-new Camera Control button, and the A18 Pro chip. The iPhone 16 Pro has a 6.3-inch display, while the iPhone 16 Pro Max features a 6.9-inch display—the biggest iPhone display ever. The borders around the display are the thinnest of any Apple device. The...
Glowtime Live Coverage Article 1

Apple Event Live Blog: iPhone 16, Apple Watch 10, and New AirPods!

Monday September 9, 2024 9:21 am PDT by
Apple's "It's Glowtime" event kicks off today at 10:00 a.m. Pacific Time, where we're expecting to see the iPhone 16 lineup and some updated Apple Watch and AirPods models unveiled, and perhaps some other announcements. Apple is providing a live video stream on its website, on YouTube, and in the company's TV app across various platforms. We will also be updating this article with live blog...
airpods max 2024 colors

Apple Updates AirPods Max With USB-C Port and New Colors

Monday September 9, 2024 10:36 am PDT by
Apple today announced that the AirPods Max are being updated with a USB-C charging port and new color options, including Midnight, Blue, Purple, Orange, and Starlight. In addition, Apple said the AirPods Max are gaining support for Personalized Spatial Audio with the upcoming iOS 18 software update. The updated AirPods Max will be available to pre-order for $549 starting today, and the...
iphone 16 pro pro max

First iPhone 16 Carrier Deals Include iPhone 16/16 Pro For Free, $1,000 Off iPhone 16 Pro Max

Monday September 9, 2024 3:18 pm PDT by
Apple today announced the latest lineup of iPhones, including the iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max. Pre-orders for these devices begin September 13, and if you plan on ordering from a cellular carrier in the United States, there will be plenty of options for discounts from the major carriers. AT&T is offering the iPhone 16 and iPhone 16 Pro at no cost with...
Screenshot 2024 09 09 at 6

Apple Announces Thinner Apple Watch Series 10 With Bigger Screen Than Ultra

Monday September 9, 2024 10:11 am PDT by
Apple at its event today announced the Apple Watch Series 10, featuring a wide-angle OLED display that is larger than the Apple Watch Ultra, with the company describing it as the "biggest display and thinnest design ever." The Series 10 is 9.7mm thick, which is nearly 10% thinner than Series 9, and it weighs 20% less than the Stainless Steel Series 9. The Aluminum cases also weigh up to 10%...
sonny iphone 16 pro colors

New iPhone 16 and iPhone 16 Pro Colors Revealed Ahead of Apple Event

Friday September 6, 2024 5:01 am PDT by
Apple is "shaking up its color palette" for its iPhone 16 lineup this year, according to well-connected Bloomberg reporter Mark Gurman. Early iPhone 16 Pro dummy models via Sonny Dickson According to Gurman, the iPhone 16 Pro models will come in a Gold Titanium to replace Blue Titanium, while the Black, White, and Natural Titanium options that debuted with the iPhone 15 Pro will remain...
iphone 16 lineup colors

Apple Discontinues iPhone 15 Pro, iPhone 15 Pro Max and iPhone 13

Monday September 9, 2024 2:09 pm PDT by
With the launch of the new iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max, Apple has discontinued some of its older iPhones. As of today, Apple is no longer selling the iPhone 13, and the iPhone 15 Pro and iPhone 15 Pro Max have been replaced with the iPhone 16 Pro and iPhone 16 Pro Max. The iPhone SE remains as Apple's most affordable device, with the iPhone 14 and iPhone...

Top Rated Comments

zepfhyr Avatar
44 months ago
The first thought that comes to mind is someone installing a compromised IoT device that gains legitimate access to their network and then uses the Find My network to funnel data out of the network, bypassing any firewall rules that prevent the IoT device from communicating with the Internet at large.

It's the type of thing you'd see in a heist or spy movie to try and snag someone's password.
Score: 10 Votes (Like | Disagree)
Unregistered 4U Avatar
44 months ago
Another
“IF YOU SET EVERYTHING UP JUUUUUUUUUST RIGHT, YOU CAN DO A THING!” from a security researcher. AirTags is the security gift that keeps on giving.
Next week,
“We’ve been able to determine that if you accelerate an AirTag at just the right speed towards a target that’s not trying to dodge and is totally aware and ok that you’re throwing it (though accelerate sounds cooler) YOU MAY BE ABLE TO HIT THEM!”
Score: 8 Votes (Like | Disagree)
ArtOfWarfare Avatar
44 months ago
This could be used for some kind of Denial of Service Attack, couldn't it?

You set up a server that's just spamming the Find My network, then all the Apple devices are constantly bouncing these spam messages around. They may end up drowning out legitimate Find My network messages.
Score: 8 Votes (Like | Disagree)
no_idea Avatar
44 months ago
Waiting for someone to show a hack that executed the following steps:
1) uses forgot password
2) clicks try another device for access code pin
3) has a hamster run in a wheel to disrupt radio waves transmitting the secret pin
4) said wheel traps the secret pin and translated via a sudoku puzzle to the hacker
5) hacker inlists a millennial to decrypt the puzzle
6) millennial asks for gluten free juice cleanser for payment
7) hacker gets in!
Score: 7 Votes (Like | Disagree)
TiggrToo Avatar
44 months ago

This could be used for some kind of Denial of Service Attack, couldn't it?

You set up a server that's just spamming the Find My network, then all the Apple devices are constantly bouncing these spam messages around. They may end up drowning out legitimate Find My network messages.
From the source:


With the public key validity check implemented, everything worked flawlessly. While I didn't do extensive performance testing and measurements, here are some estimates:

The sending rate on the microcontroller is currently ~3 bytes/second. Higher speeds could be achieved e.g. simply by caching the encoding results or by encoding one byte per advertisement
In my tests, the receiving rate was limited by slow Mac hardware. Retrieving 16 bytes within one request takes ~5 seconds
The latency is usually between 1 and 60 minutes depending on how many devices are around and other random factors.
Score: 7 Votes (Like | Disagree)
centauratlas Avatar
44 months ago
This is awesome (assuming it can't be badly exploited). It gives an ad hoc wireless relay network. There could be plenty of uses.
Score: 6 Votes (Like | Disagree)