This is another example of very specific situations in INFOSEC. It’s unlikely that you will become a victim to this key logger attack. And of course the title suggests that Apple’s Find My network is compromised. This is not the case. But it is being utilized, in this instance, against Apple’s rules and regulations.
The real hack here is that the victim had their keyboard modified or was given a compromised keyboard that broadcasts Bluetooth signals, that are then picked up on the Find My network. It could be transmitted via Cellular, Bluetooth, WiFi, audible sound, monitoring energy differentials, etc. It’s the HMI hardware that’s been compromised. Apple will likely develop updates to their Find My network, but the compromised keyboard could then be modified to use some other service or broadcast methods. Apple fixing the Find My network to recognize bad actors will not prevent this style of attack.
deleted by creator
I think the main concern is how easy and ubiquitous it is, while also being pretty hard to detect. No other transmission method lends itself so perfectly to this kind of attack.
And I wouldn’t say it’s that unlikely. Every publicly accessible keyboard could be targeted, like in schools or universities. Buy an identical model to those that are used in the computer room, modify it, switch it out, and wait for people to enter their emails and passwords.
Wow, this is quite the elaborate scheme!
It’s really “Find My Phone” can be used as a sort of ubiquitous low bandwidth whisper network for sending back secrets from hidden devices.
deleted by creator
Any platform has vulnerability to exploit to some degree. But this article is about piggybacking on the Find My network to transmit data without actually compromising the network. It’s a clever technique, and worth reading more than the headline.
It’s very interesting but the article is a rehash of some 2-year-old work by others, and doesn’t really update anything, apart from saying that “apparently, Apple addressed this problem.” with no further clarification. Pretty low effort tbh.
It’s not apple being hacked here. The network is just being abused to carry data out. It requires a compromised hardware device e.g. a hacked keyboard. You don’t even need to be using an apple device, it just piggybacks off of any nearby iPhones.
It’s not malware. They are talking abot physical keyloagger inserted into your keyboard. Real life hack possibility level: 0