Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

'Severe' AirDrop exploit could expose email and phone number in highly specific circumstances

Researchers at Germany's Technische Universitat Darmstadt say AirDrop can reveal a user's phone number and email address to strangers

Researchers have demonstrated a theoretical risk of AirDrop sharing an iPhone user's phone number and email address with strangers.

For hackers to steal this private information, they would need to perform a brute-force attack or another "simple technique," however. They would need to do this while being in physical proximity to a user with an open share sheet on an AirDrop-enabled Apple device.

While those are highly particular conditions, the researchers at Germany's Technische Universitat Darmstadt believe this vulnerability poses a "severe privacy leak."

"To determine whether the other party is a contact," the researchers wrote, "AirDrop uses a mutual authentication mechanism that compares a user's phone number and email address with entries in the other user's address book."

Although Apple encrypts that information, the researchers say the iPhone maker's hashing technique "fails to provide privacy-preserving contact discovery as so-called hash values can be quickly reversed using simple techniques such as brute-force attacks."

The security analysts found the AirDrop flaw in 2019. They reported it to Apple that May but never received any confirmation from the Cupertino company.

"So far," said the researchers, "Apple has neither acknowledged the problem nor indicated that they are working on a solution. This means that the users of more than 1.5 billion Apple devices are still vulnerable to the outlined privacy attacks. Users can only protect themselves by disabling AirDrop discovery in the system settings and by refraining from opening the sharing menu."

The researchers published a public warning for the first time on Wednesday.

AirDrop is often the quickest way to transfer content between iPhone, iPad, iPod touch, and Mac. The service debuted on the Mac in 2011 with OS X Lion and on iOS in 2013.

Stay on top of all Apple news right from your HomePod. Say, "Hey, Siri, play AppleInsider," and you'll get latest AppleInsider Podcast. Or ask your HomePod mini for "AppleInsider Daily" instead and you'll hear a fast update direct from our news team. And, if you're interested in Apple-centric home automation, say "Hey, Siri, play HomeKit Insider," and you'll be listening to our newest specialized podcast in moments.



10 Comments

22july2013 3736 comments · 11 Years

Which hash algorithm does Apple use for this? The remote article doesn't indicate either. Isn't the main cause of this problem that the hash algorithm is too simple?

pulseimages 656 comments · 8 Years

I always have Receiving Off unless I am transferring between devices but that’s always done at home. 

mike1 3437 comments · 10 Years

"Highly specific circumstances" is definitely an understatement.
So, a hacker would have to wait around for two people to decide to AirDrop something, then in the seconds the share sheet is open, perform a "brute-force" attack.
And the most they can get is a phone number or e-mail address?!
One would have a better chance of winning the lottery than falling prey to this.

sflocal 6138 comments · 16 Years

mike1 said:
"Highly specific circumstances" is definitely an understatement.

So, a hacker would have to wait around for two people to decide to AirDrop something, then in the seconds the share sheet is open, perform a "brute-force" attack.
And the most they can get is a phone number or e-mail address?!
One would have a better chance of winning the lottery than falling prey to this.

It's a pretty low-priority exploit for sure, but as Apple always makes privacy a central talking-point about iPhones, I'm glad there are folks out there that find these issues and it will make the iPhone that much better.  


Ever wonder why only read about Apple security flaws and never one peep about Android security breaches?  It's because Android is such a joke of an OS that it's a wild-west  of security breaches.  It's so prevalent that people consider it a norm.  This is reason-one why I will never move over to Android.  

Keep up the good work people!

rcfa 1123 comments · 17 Years

If this can’t be used as a springboard for privilege escalation, who cares?

If you have to linger around people for so long that they start airdropping stuff to each other, and manage to hit the short second the sharing dialogue is open, without first being reported as a stalker, you probably know these people well enough to already know their name and phone number…

…and names and phone numbers used to be in public phone books without significant ill effect.

So, yeah, nice you found something, but no, it’s nothing to worry about, unless there’s significant more to it than is being reported.

“Severe” is a massive overstatement. “Severe” are the leaks that Facebook keeps having…