Apple's Find My Network Exploit Lets Hackers Track Devices

Apple's Find My Network Exploit Lets Hackers Track Devices
Photo by Đức Trịnh / Unsplash

Apple’s Find My network is a widely praised tool for locating lost devices, but new research has uncovered a serious exploit that turns this convenience into a security nightmare. A team of researchers from George Mason University has discovered an attack method called nRootTag, which allows hackers to track nearly any computer, smartphone, or IoT device remotely—without the owner’s knowledge.

How the Exploit Works

The nRootTag attack tricks Apple’s Find My network into believing that a target device is an AirTag. Normally, Apple’s AirTags send out Bluetooth signals that are picked up by nearby Apple devices, which then relay their location anonymously to Apple's servers. This lets AirTag owners track their lost items.

However, researchers found a way to turn any device—a laptop, gaming console, or even an e-bike—into a homing beacon without needing Apple’s permission. Using a device’s Bluetooth address, attackers can inject spoofed Find My signals into Apple’s network, effectively allowing them to track the target's real-time location.

Disturbing Real-World Implications

The researchers successfully demonstrated real-world attacks, including:

  • Tracking a stationary computer to within 10 feet.
  • Monitoring a moving e-bike as it traveled through a city.
  • Reconstructing an airplane passenger’s flight path based on a gaming console in their luggage.

One particularly alarming scenario is tracking smart home devices, such as smart locks or security cameras. If a hacker can locate such devices, they could target them for cyberattacks or physical break-ins.

Why This Attack is So Dangerous

Unlike other Bluetooth-based tracking attacks, nRootTag does not require administrator privileges. Apple’s AirTag security design prevents Bluetooth addresses from being modified on-the-fly, so instead, the researchers reverse-engineered the Find My cryptographic key to make it match an existing device’s Bluetooth address.

The key reasons this attack is extremely dangerous:

  • 90% success rate in tracking devices.
  • Works on nearly any platform, including Windows, Linux, Android, Smart TVs, and VR headsets.
  • Can be executed remotely, meaning a hacker thousands of miles away can monitor devices globally.
  • Uses GPUs to accelerate key cracking, taking advantage of cheap computing power available due to the AI boom.

What makes nRootTag particularly concerning is that this tracking can happen without the target even realizing it. Unlike AirTags, which trigger anti-stalking alerts, regular computers and smartphones do not have similar protections.

Apple’s Response & The Long-Term Fix

Apple was informed of the Find My vulnerability in July 2024 and has acknowledged the issue in subsequent security updates. However, a complete fix could take years because:

  • Many users delay or ignore updates.
  • Apple cannot force updates on all devices.
  • The Find My network remains vulnerable until outdated devices naturally phase out.

The research team will present their findings at the USENIX Security Symposium in August 2025, one of the world’s leading cybersecurity conferences.

How to Protect Yourself

While waiting for a long-term fix, here’s what you can do to reduce your risk:

  1. Disable Bluetooth when not in use – Many apps request Bluetooth access unnecessarily.
  2. Be cautious of apps requesting Bluetooth permissions – Especially those that don’t need it for core functionality.
  3. Update your devices regularly – Security patches may help mitigate this issue.

Final Thoughts

The nRootTag exploit is a major wake-up call for Apple and the tech industry at large. As more devices become interconnected, security loopholes in trusted systems—like the Find My network—can be weaponized in ways never imagined. This is yet another reminder that privacy and security should never be taken for granted.

With Apple working on a fix, users must remain vigilant and take proactive steps to safeguard their personal devices from unwanted tracking.