{"id":77,"date":"2021-10-09T19:45:26","date_gmt":"2021-10-09T23:45:26","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/?p=77"},"modified":"2021-10-24T13:49:36","modified_gmt":"2021-10-24T17:49:36","slug":"apple-airtag-bug-enables-good-samaritan-attack","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/2021\/10\/09\/apple-airtag-bug-enables-good-samaritan-attack\/","title":{"rendered":"Apple AirTag Bug Enables \u2018Good Samaritan\u2019 Attack"},"content":{"rendered":"<p>I thought this was interesting and relevant to our recent discussions about social engineering. Apple Air Tags are used to locate frequently lost devices. Finders of a tag can scan the device on their iPhone to reveal information about the tag\u2019s owner if it\u2019s in \u201clost mode.\u201d\u00a0 During the scan, the finder\u2019s iPhone displays a custom web page with the owner\u2019s phone number.<\/p>\n<p>The Air Tag \u201cGood Samaritan Attack\u201d exploits a flaw in this process which does not sanitize the input to the phone number field.\u00a0 This allows the bad actor to input anything they\u2019d like into the field, e.g. a redirect to an iCloud phishing page.\u00a0 The deployment is similar to USB baiting attacks where USB devices are dropped outside the target location.\u00a0 The Good Samaritan picks up the device, scans the tag, and is redirected to the attack page. This is concerning as users are not as diligent with checking sites on mobile devices and it may not be clear that they are being redirected to a malicious site.<\/p>\n<p>The researcher who found the bug, Bobby Rauch, reported that Apple was not responsive to his attempts to disclose the issue.\u00a0 This has been a trend among security researchers that report issues to Apple.\u00a0 Rauch stated that they never answered his questions about the bug bounty program and did not follow-up with their remediation plan.\u00a0 Apple did ask that Rauch avoid publicizing his findings; however, he did not comply with this request, due to their lack of communication.<\/p>\n<p>&nbsp;<\/p>\n<p>Article: Apple AirTag Bug Enables \u2018Good Samaritan\u2019 Attack<\/p>\n<p>Author: Brian Krebs<\/p>\n<p>Published: September 28, 2021<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2021\/09\/apple-airtag-bug-enables-good-samaritan-attack\/\">Link<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I thought this was interesting and relevant to our recent discussions about social engineering. Apple Air Tags are used to locate frequently lost devices. Finders of a tag can scan the device on their iPhone to reveal information about the tag\u2019s owner if it\u2019s in \u201clost mode.\u201d\u00a0 During the scan, the finder\u2019s iPhone displays a [&hellip;]<\/p>\n","protected":false},"author":26653,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[450],"tags":[450],"class_list":{"0":"post-77","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-7","7":"tag-week-7","8":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/77","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/users\/26653"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"predecessor-version":[{"id":78,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/77\/revisions\/78"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}