Apple AirTag trackers being used by car thieves

Police are discovering AirTags being turned into a car crooks tool. Apple’s tiny AirTag tracker that sells for just $29 is capable of tracking just about anything.  That’s why car crime detectives are saying the latest tracking technology is being used to steal cars.

Here’s how the AirTag car theft scam works

  1. Car thieves troll for desirable vehicles. They scout anywhere nice cars hang out from the mall, restaurants or outside of a local store.
  2. The car crook attaches one of these tiny trackers to your car by placing it near the gas cap, on trailer hitches, even inside trailer light socket and taping one under the bumper.
  3. Using an Apple device such as an iPhone and its Find My app, the tracker guides the criminal to the owner’s home where they steal the car.

Most popular cars being AirTagged and stolen

  • Lexus RX350
  • Ford F-150
  • Toyota Highlander
  • Honda CRV

 

 

What to do if you are AirTagged

If you’ve got an iPhone, you may get tipped off in time to do something. AirTags often send a warning to iPhones that they are being tracked when the AirTag does not belong to the iPhone moving near it.

If you see one of these alert messages while driving, safely pull over in a populated area and follow on screen instructions to make the AirTag beep by selecting Play Sound.

Apple shows you how to disable the AirTag if you are lucky enough to find the rogue tracker.

 

Tips to keep from falling victim to the new hightech car ripoff scheme

  • Park in a garage when possible
  • Block one car with another if outside in driveway
  • Use surveillance cams in parking area
  • Deploy a visible steering wheel lock such as a the Club
  • Turn AirTags of your own against car thieves.
  • Use two AirTags:  One placed inside as a decoy near that can easily be found by a the car thief and a second one well-hidden insider or outside the vehicle

 

Related:

 

Related posts

Best last minute holiday gifts

Understanding brushing scams and how to protect yourself

From TikTok to trouble: How your online data can be weaponized against you