Step 1: Target Selection: Identify a Samsung Galaxy device running a vulnerable version of Android with the 'Track My Mobile' feature enabled.
Step 2: Physical Proximity: The attacker must be physically close to the target device.
Step 3: GPS Spoofing Tool: The attacker uses a readily available GPS location spoofer (e.g., a software application on another Android device or a dedicated GPS spoofing device).
Step 4: Spoofing Configuration: The attacker configures the GPS spoofer to transmit arbitrary GPS coordinates.
Step 5: Data Injection: The GPS spoofer transmits the spoofed GPS coordinates, which the SamsungDive subsystem accepts without proper validation.
Step 6: Location Override: The 'Track My Mobile' feature reports the attacker-provided location instead of the device's actual location.