Flipper Hacking Device Gained Popularity Among Users

The Flipper Zero hacking device plans on selling $80 million worth of gadgets this year, up from preorders on Kickstarter that totaled over $5 million. It also claims to have sold $25 million of the devices last year.

The business, established in Russia in 2020, departed the nation at the outbreak of the conflict and has since relocated. It claims to no longer be connected to Russia.

What is a Flipper Zero?

Flipper Zero is a “portable gamified multi-tool” designed for anybody interested in cybersecurity, including penetration testers, intellectual people on the internet, students, and anyone with deeper motives.

The tool offers a variety of ways to control your environment, such as wireless devices (like garage openers), RFID card systems, remote keyless entry systems, Flipper Hacking Devices, key fobs, and barrier access. In essence, you may program it to mimic a variety of lock systems.

Additionally, it’s a fun experimentation tool that reveals how insecure the majority of the globe is in reality. The company also emphasizes that the firmware is open source and available for anybody to review.

 “Current events will not affect the Flipper Zero production in any way, and all ordered devices will be shipped to backers and those who have pre-ordered, though there may be delays for customers from the CIS countries [the Commonwealth of Independent States] due to logistics disruptions in the region,” the company said in an Instagram post.

Flipper Devices, a firm that employs both Ukrainians and Russians, released a statement in which it declared that it strongly objects to the continuing “special military operation” and that neither of our team members supports it.

The firm is not Russian, according to a corporate representative. Its CEO and more than 10% of the crew are both Ukrainian.

According to TechCrunch report, the Flipper Zero device is on track to sell $80 million worth of its products this year 

Further, Flipper Devices is a distributed business that is expanding its London headquarters. Additionally, it adds that Flipper Gadgets works to relocate all of its personnel outside of Russia, doesn’t hire there, and doesn’t export gadgets to Russia.

Some of their workers may travel there to visit family or for other personal reasons as they hold Russian passports.

Tech Specifications of the Tool

  • ARM Cortex-M4 32-bit 64 MHz (application processor)
  • ARM Cortex-M0+ 32 MHz (network processor)
  • Flash: 1024 KB
  • SRAM: 256 KB
  • 1.4-inch 128 x 64 LCD monochrome display
  • 5-button joystick with back button
  • 2000 mAh rechargeable battery
  • Sub-1 GHz frequencies: 315 MHz, 433 MHz, 868 MHz, and 915 MHz (depending on regions)
  • 13.56 MHz NFC
  • 125 kHz RFID
  • 18 GPIO connector
  • Infrared (TX/RX range: 800-950 nm, TX power: 300 mW)
  • iButton 1-Wire support (Dallas DS1990A/CYFRAL compatible)
  • USB 2.0 port, type C

Finally, it’s one of the simplest, most affordable methods to use RFID and NFC. It’s also an excellent instructional tool that introduces individuals of all ages to cybersecurity.

“AI-based email security measures Protect your business From Email Threats!” – .

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

21 hours ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

21 hours ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

21 hours ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

21 hours ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

2 days ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

2 days ago