Monday, April 14, 2025
HomeAppleHackers Use Flipper Zero Device to Attack Nearby iPhones with Notification Pop-ups

Hackers Use Flipper Zero Device to Attack Nearby iPhones with Notification Pop-ups

Published on

SIEM as a Service

Follow Us on Google News

Flipper Zero Devices have been discovered with the capability to perform Denial of Service attacks on iPhones.

Threat actors can probably spam the iPhones with so many pop-ups prompting about nearby AirTag, Apple TV, AirPods, and other Apple devices.

Moreover, Flipper Zero Devices can also perform wireless attacks that target car keyfobs, RFID cards, iPhones, and many more.

- Advertisement - Google News

Security Researcher Anthony, who discovered this attack, termed this as “a Bluetooth advertising assault”.

Flipper Zero Attack Nearby iPhones

Flipper Zero firmware can be used for conducting a broadcast called “Bluetooth Advertising,” which is a type of transmission in the Bluetooth Low Energy protocol used by Apple for enabling iDevice users to connect to Apple Watch and other Apple devices and send pictures using the Bluetooth file sharing system AirDrop.

TechCrunch was able to replicate the vulnerabilities in both the iPhone 8 and the recently released iPhone 14 Pro models, which could potentially be exploited by attackers.

This was done by changing the Flipper Zero firmware with a custom compiled code. After this, a simple switching “ON” of Bluetooth from Flipper Zero begins the broadcasting of pop-up signals to nearby iPhones.

“The exploits worked on iPhones both when Bluetooth was enabled or switched off in the Control Center, but could not reproduce the exploit when Bluetooth was fully switched off from the Settings,”.

Furthermore, the researcher (Anthony) also said that he was able to create an attack that can broadcast signals over longer distances, even miles, and create pop-ups with millions of devices spamming at a high range.

However, he is not providing more details about the attack as it could lead to a vast attack surface for threat actors who intend to spam victims.

A complete exploit and research was published by Anthony, providing more information about the Denial of Service (DoS) attack.

He also added that Apple could mitigate this issue by verifying the integrity of the Bluetooth Devices connecting to the iPhones. They can also reduce the distance at which iDevices can connect to other devices using Bluetooth.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...