Title
AirTag of the Clones: Shenanigans with Liberated Item Finders
Abstract
AirTags are the first standalone devices that support Apple’s Find My network. Besides being a low-cost item finder, they provide an exciting research platform into Apple’s ecosystem security and privacy aspects. Each AirTag device contains a Nordic nRF52832 chip for Bluetooth Low Energy (BLE) and Near Field Communication (NFC) connectivity, as well as Apple’s U1 chip for Ultra-wideband (UWB) fine ranging. In this paper, we analyze the AirTag hardware and firmware in detail and present attacks that also affect the whole AirTag ecosystem. After performing a voltage glitching attack on the nRF chip, we extract and reverse engineer the main firmware. We add firmware functionality, change capabilities, and demonstrate cloning AirTags. Moreover, we analyze the protocol used between iPhones and AirTags, unlocking undocumented commands. These commands enable limited firmware instrumentation over-the-air on unmodified AirTag hardware, including playing sound sequences and downgrading the nRF and U1 firmware.
Year
DOI
Venue
2022
10.1109/SPW54247.2022.9833881
2022 IEEE Security and Privacy Workshops (SPW)
Keywords
DocType
ISSN
AirTag,UWB,Fault Injection,Glitching,nRF,Find My
Conference
2639-7862
ISBN
Citations 
PageRank 
978-1-6654-9644-5
0
0.34
References 
Authors
5
4
Name
Order
Citations
PageRank
Thomas Roth100.34
Fabian Freyer200.34
Matthias Hollick300.34
Jiska Classen4339.10