Flipper Hacking Device Gained Popularity Among Users

The Flipper Zero hacking device plans on selling $80 million worth of gadgets this year, up from preorders on Kickstarter that totaled over $5 million. It also claims to have sold $25 million of the devices last year.

The business, established in Russia in 2020, departed the nation at the outbreak of the conflict and has since relocated. It claims to no longer be connected to Russia.

What is a Flipper Zero?

Flipper Zero is a “portable gamified multi-tool” designed for anybody interested in cybersecurity, including penetration testers, intellectual people on the internet, students, and anyone with deeper motives.

The tool offers a variety of ways to control your environment, such as wireless devices (like garage openers), RFID card systems, remote keyless entry systems, Flipper Hacking Devices, key fobs, and barrier access. In essence, you may program it to mimic a variety of lock systems.

Additionally, it’s a fun experimentation tool that reveals how insecure the majority of the globe is in reality. The company also emphasizes that the firmware is open source and available for anybody to review.

 “Current events will not affect the Flipper Zero production in any way, and all ordered devices will be shipped to backers and those who have pre-ordered, though there may be delays for customers from the CIS countries [the Commonwealth of Independent States] due to logistics disruptions in the region,” the company said in an Instagram post.

Flipper Devices, a firm that employs both Ukrainians and Russians, released a statement in which it declared that it strongly objects to the continuing “special military operation” and that neither of our team members supports it.

The firm is not Russian, according to a corporate representative. Its CEO and more than 10% of the crew are both Ukrainian.

According to TechCrunch report, the Flipper Zero device is on track to sell $80 million worth of its products this year 

Further, Flipper Devices is a distributed business that is expanding its London headquarters. Additionally, it adds that Flipper Gadgets works to relocate all of its personnel outside of Russia, doesn’t hire there, and doesn’t export gadgets to Russia.

Some of their workers may travel there to visit family or for other personal reasons as they hold Russian passports.

Tech Specifications of the Tool

  • ARM Cortex-M4 32-bit 64 MHz (application processor)
  • ARM Cortex-M0+ 32 MHz (network processor)
  • Flash: 1024 KB
  • SRAM: 256 KB
  • 1.4-inch 128 x 64 LCD monochrome display
  • 5-button joystick with back button
  • 2000 mAh rechargeable battery
  • Sub-1 GHz frequencies: 315 MHz, 433 MHz, 868 MHz, and 915 MHz (depending on regions)
  • 13.56 MHz NFC
  • 125 kHz RFID
  • 18 GPIO connector
  • Infrared (TX/RX range: 800-950 nm, TX power: 300 mW)
  • iButton 1-Wire support (Dallas DS1990A/CYFRAL compatible)
  • USB 2.0 port, type C

Finally, it’s one of the simplest, most affordable methods to use RFID and NFC. It’s also an excellent instructional tool that introduces individuals of all ages to cybersecurity.

“AI-based email security measures Protect your business From Email Threats!” – .

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…

6 hours ago

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…

6 hours ago

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…

6 hours ago

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…

6 hours ago

New Windows Zero-Day Vulnerability Let Attackers Steal Credentials From Victim’s Machine

A security researcher discovered a vulnerability in Windows theme files in the previous year, which…

6 hours ago

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…

6 hours ago