Watch: Apple AirTags Hacked By Security Researcher The Apple AirTag hasn't even been out for two weeks, and someone has already hacked into the new tracking device. 9to5Mac reports that security researcher https://twitter.com/ghidraninja!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); was able to "break into the microcontroller of the AirTag" and modify elements of the item tracker software. A microcontroller is an integrated circuit (IC) used for controlling devices usually via a microprocessing unit, memory, and other peripherals. According to AllAboutCircuits, "these devices are optimized for embedded applications that require both processing functionality and agile, responsive interaction with digital, analog, or electromechanical components." In a series of posts, Stack Smashing's Twitter account demonstrated that after "bricking 2 AirTags," the researcher was able to "break into the microcontroller of the AirTag!" Yesss!!! After hours of trying (and bricking 2 AirTags) I managed to break into the microcontroller of the AirTag! 🥳🥳🥳 /cc https://twitter.com/colinoflynn?ref_src=twsrc%5Etfw!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); https://twitter.com/LennertWo?ref_src=twsrc%5Etfw!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); pic.twitter.com/zGALc2S2Ph — stacksmashing (@ghidraninja) https://twitter.com/ghidraninja/status/1391148503196438529?ref_src=twsrc%5Etfw!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); He then said, "Be careful when scanning untrusted AirTags or this might happen to you." Be careful when scanning untrusted AirTags or this might happen to you😆 pic.twitter.com/LkG5GkvR48 — stacksmashing (@ghidraninja) https://twitter.com/ghidraninja/status/1391336535929368576?ref_src=twsrc%5Etfw!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); Stack Smashing posted a YouTube video titled "How I hacked the Apple AirTags," on Tuesday, outlining how he managed to hack the device. Apple has some explaining to do... Who would win: (1) A company with $111 billion revenue from it's first quarter. (2) One smart German? https://t.co/aNzEReP0gG — Colin O'Flynn (@colinoflynn) https://twitter.com/colinoflynn/status/1391168784271032320?ref_src=twsrc%5Etfw!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); Tyler Durden Wed, 05/12/2021 - 20:40