Endpoint/Device Security

Keylogged password theft likely with Apple’s ‘Find My’ network exploitation

Share

Threat actors could leverage Apple's "Find My" location network used for locating lost Apple devices to facilitate the exfiltration of keylogger-stored information, BleepingComputer reports.

Positive Security researchers who developed a proof-of-concept hardware device integrating an ESP32 Bluetooth transmitter-equipped keylogger into a USB keyboard discovered that any keyboard-inputted data could be transmitted using the Find My network. Such an attack, which is significantly stealthier than WLAN keyloggers and Raspberry Pi devices due to Bluetooth transmission, also does not require an AirTag for the keylogger to function, according to the study reported on Heise.

The findings also showed 26 characters per second transmission rate and 7 characters per second reception rate for the PoC attack, which was also noted to have latency ranging from a minute to an hour based on Apple device coverage near the keylogger.

Apple has yet to respond to queries regarding the PoC attack leveraging its "Find My" location network.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.