If someone can get near you, or accessories like your favorite backpack, sneaking into your life some tracking technology is relatively easy for them to put in place. This client advisory unpacks the recent events of VIPs being tracked by Tile or Apple AirTag technology.
Given the recent marketing push by Apple, the new AirTag appears to be the tracker of choice among consumers and would be stalkers.
A few weeks ago, a Sports Illustrated model reported that a stranger tried to track her location using an Apple AirTag. To date our clients have reported finding trackers, including AirTag competitor models, on jackets, bikes, inside purses, computers/work bags, and in car glove compartments. It can be planted almost any place at any time.
With an ounce of prevention, you can become more aware of tracking technology to protect yourself.
Tracking someone without their consent is quite common:
Unmasking Tracking Devices:
Preventing Tracking Without Consent:
What to Do If You Find a Rogue Apple AirTag:
Being tracked without your permission is not okay. If you discover that you are being tracked, consider filing a police report.
If you feel your personal safety could be in danger, consider developing an emergency plan now and share it with people you trust. Resources such as the ones available at this website can help by providing ideas about how to build your personal safety plan: https://www.techsafety.org/resources-survivors/technology-safety-plan.
During the course of our investigative work, Fortalice has observed an increasing and alarming trend: personal email compromise is leading to business email compromise. Threat actors will leverage weaknesses regarding executives’ or board members’ personal cybersecurity hygiene to gain access to their business accounts. Extortion also remains a top cybersecurity threat, with organized criminals overseas routinely targeting corporations and the people who support them.
Silicon Valley Bank (SVB) was shuttered early this month and had its deposits seized in the largest U.S. bank failure since the 2008 financial crisis. Although it may seem like SVB’s collapse will only impact its direct customers and depositors, it is far more complicated. Like vultures to roadkill, cyber scammers often wait to exploit and target victims after tragedy strikes, or bad news arises. A perfect storm of stress, uncertainty, and urgency for customers and vendors alike during this time can impair someone’s judgement when they click links and open emails they otherwise would ignore or delete. Fortalice has outlined a few different ways cybercriminals social engineer their victims during times of extreme distress and insecurity.