Thursday, February 27, 2025
HomeCyber Security NewsFlipper Hacking Device Gained Popularity Among Users

Flipper Hacking Device Gained Popularity Among Users

Published on

SIEM as a Service

Follow Us on Google News

The Flipper Zero hacking device plans on selling $80 million worth of gadgets this year, up from preorders on Kickstarter that totaled over $5 million. It also claims to have sold $25 million of the devices last year.

The business, established in Russia in 2020, departed the nation at the outbreak of the conflict and has since relocated. It claims to no longer be connected to Russia.

What is a Flipper Zero?

Flipper Zero is a “portable gamified multi-tool” designed for anybody interested in cybersecurity, including penetration testers, intellectual people on the internet, students, and anyone with deeper motives.

The tool offers a variety of ways to control your environment, such as wireless devices (like garage openers), RFID card systems, remote keyless entry systems, Flipper Hacking Devices, key fobs, and barrier access. In essence, you may program it to mimic a variety of lock systems.

Additionally, it’s a fun experimentation tool that reveals how insecure the majority of the globe is in reality. The company also emphasizes that the firmware is open source and available for anybody to review.

 “Current events will not affect the Flipper Zero production in any way, and all ordered devices will be shipped to backers and those who have pre-ordered, though there may be delays for customers from the CIS countries [the Commonwealth of Independent States] due to logistics disruptions in the region,” the company said in an Instagram post.

https://www.instagram.com/p/CbFrqJgAZPC/?hl=en

Flipper Devices, a firm that employs both Ukrainians and Russians, released a statement in which it declared that it strongly objects to the continuing “special military operation” and that neither of our team members supports it.

The firm is not Russian, according to a corporate representative. Its CEO and more than 10% of the crew are both Ukrainian.

According to TechCrunch report, the Flipper Zero device is on track to sell $80 million worth of its products this year 

Further, Flipper Devices is a distributed business that is expanding its London headquarters. Additionally, it adds that Flipper Gadgets works to relocate all of its personnel outside of Russia, doesn’t hire there, and doesn’t export gadgets to Russia.

Some of their workers may travel there to visit family or for other personal reasons as they hold Russian passports.

Tech Specifications of the Tool

  • ARM Cortex-M4 32-bit 64 MHz (application processor)
  • ARM Cortex-M0+ 32 MHz (network processor)
  • Flash: 1024 KB
  • SRAM: 256 KB
  • 1.4-inch 128 x 64 LCD monochrome display
  • 5-button joystick with back button
  • 2000 mAh rechargeable battery
  • Sub-1 GHz frequencies: 315 MHz, 433 MHz, 868 MHz, and 915 MHz (depending on regions)
  • 13.56 MHz NFC
  • 125 kHz RFID
  • 18 GPIO connector
  • Infrared (TX/RX range: 800-950 nm, TX power: 300 mW)
  • iButton 1-Wire support (Dallas DS1990A/CYFRAL compatible)
  • USB 2.0 port, type C

Finally, it’s one of the simplest, most affordable methods to use RFID and NFC. It’s also an excellent instructional tool that introduces individuals of all ages to cybersecurity.

“AI-based email security measures Protect your business From Email Threats!” – .

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...