The latest in a string of security breaches linked to the AirPods has led to a large-scale hack of Apple’s AirPilot app.
The AirPodcast app has been hacked, according to a tweet by AirPod developer John S. Miller.
The tweet was accompanied by a link to an iOS device that contained a code that can be used to decrypt the AirPod firmware.
“AirPod firmware decryption can be leveraged to create a remote system on an iOS devices, or to take over a device,” the tweet said.
“Using this remote control, a remote attacker can take control of an AirPod and launch a variety of malicious software.”
A tweet from AirPod developer John Miller.
(Photo: @johnmiller_dmg)The tweet was also accompanied by the link to a device that included a code named ‘AirPod_decrypt’ that can decrypt the firmware.
Miller told TechCrunch that he was able to successfully decrypt the app with the code, which is in the AirPad SDK.
“The AirPod decryption is pretty trivial and should be trivial for anybody to use to get the firmware to decrypt,” he said.
“We have not seen anything remotely like this before.
We are very confident that it is safe, that the app is secure, and that the firmware is secure.”
The Airpod hack has also been linked to another recent iOS security breach.
Apple has acknowledged that the AirPort Express device was used in a number of attacks that targeted Apple devices.
Apple has also said it was working with the Federal Bureau of Investigation to identify the perpetrators of the latest AirPod security breach and has added a new “security feature” to the app to alert users when they are being targeted by hackers.
Apple also recently announced an update to AirPads firmware that makes it easier to remotely disable the Airpod.