Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Apple AirTag tracking can be misled by replayed Bluetooth signals
    Cybersecurity

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    adminBy adminApril 19, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Apple AirTag tracking can be misled by replayed Bluetooth signals
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Apple’s AirTag is designed to help users track lost items by relying on a vast network of nearby Apple devices. New research shows that this same system can be manipulated to display locations where an AirTag has never been.

    AirTag relay attack

    Relaying an AirTag’s BLE advertisments over the Internet injects false location reports into the Find My system

    How the attack works

    The Find My network depends on Bluetooth Low Energy (BLE) signals broadcast by AirTags. When an iPhone or other Apple device detects one of these signals, it sends an encrypted location report to Apple. The owner then sees that location in the Find My app. The encryption protects identities but also prevents the system from checking whether the reported location is genuine.

    Researchers demonstrated a relay attack that takes advantage of this limitation. They captured Bluetooth signals from a test AirTag using Android devices, Linux systems, and small embedded hardware. After recording the signals, they removed the battery from the original AirTag and replayed the captured data from a different location using custom transmitters.

    Apple devices near the replayed signal treated it as if it came from the original AirTag. These devices generated location reports based on the new location, and the Find My app displayed that position. The same approach worked across long distances by sending the captured data over the internet and replaying it in another country.

    Handling conflicting signals in Find My

    When both the original AirTag and the replayed signal are active, the app can switch between two locations. The position shown may jump from the true location to the injected one, depending on which reports are processed.

    The system handles reports in two ways. Cloud reports are accepted only if they use the current encryption key, which changes about every 24 hours. Older keys stop working after rotation. Local Bluetooth signals take priority when the owner’s device is nearby, which can override cloud data and influence what is shown.

    Captured signals remain usable for a limited time. If key rotation is paused, for example by removing the AirTag’s battery, replayed signals can continue to produce location reports for up to seven days before the system marks them as outdated.

    To support their testing, the researchers built a relay server that stored captured signals, tracked when they were first seen, and controlled when they were replayed. This setup allowed repeated tests of how long spoofed locations could persist.

    “Our results demonstrate that the design of Apple’s Find My protocol is vulnerable to practical relay attacks. Beyond highlighting this attack vector to the security community, future work will examine whether relaying could be repurposed as an active countermeasure against stalking by obfuscating or disrupting unwanted tracking,” researchers wrote.

    AirTag Apple Bluetooth misled replayed signals tracking
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleNIST to stop rating non-priority flaws due to volume increase
    Next Article The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    admin
    • Website

    Related Posts

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    eSIM was supposed to replace SIM cards, but carriers turned it into a trap

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026

    I used a simple Linux command to watch what apps do to my files in real time

    April 19, 2026

    Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,401)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,678)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    eSIM was supposed to replace SIM cards, but carriers turned it into a trap

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026

    I used a simple Linux command to watch what apps do to my files in real time

    April 19, 2026
    Most Popular
    • eSIM was supposed to replace SIM cards, but carriers turned it into a trap
    • Vercel confirms breach as hackers claim to be selling stolen data
    • I used a simple Linux command to watch what apps do to my files in real time
    • Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.