https://www.heise.de/news/Keylogger-keyboard-leaks-passwords-via-Apple-s-Find-My-location-network-9344806.html
A German IT magazine has a proof of concept ready for data exfiltration via Apple's "find my" tracking services.
Very unpleasant. In short: a keylogger can record keystrokes but its payload needs to be harvested someday and the attacker risks to be seen when harvesting. This PoC uses random IPhones of office users for this and even works on air gapped devices and needs no physical contact - in fact, the attacker does not even need to enter the building a second time. Apple has been contacted and asked for counter measures,