Tuesday, December 3, 2024
HomeCyber Security NewsAmazon Banned Flipper Zero Pentesting Tool

Amazon Banned Flipper Zero Pentesting Tool

Published on

SIEM as a Service

According to reports, Amazon has stopped selling Flipper Zero, one of the most widely used pentesting tools. Amazon tagged the product as a “card-skimming device” and prohibited its selling on the e-commerce platform. 

Flipper Zero was one of the best pentesting, which can potentially conduct replay attacks on unlock cars, doorbell activation, garage door unlocking, cloning digital keys, and much more.

People searching Flipper Zero on Amazon are landed on the error page which says, “Sorry we couldn’t find the page. Try searching or go to Amazon Home page”.

- Advertisement - SIEM as a Service

While most of the product pages are having this error, the listed products on Amazon have the availability as “Unavailable.”

One of Flipper Zero’s sellers received a notification that stated, “This product has been identified as a card skimming device. Amazon policy prohibits the sale or listing of card skimming device. For more information, please see our Lock Picking & Theft devices Seller Help Page.”

A warning message has also been issued to all the Flipper Zero sellers that within 48 hours, they must check their listings and remove all the restricted products else their account will be deactivated.

Though this product is now banned from selling on Amazon, sellers have other places to sell it without any restrictions. If you want to buy Flipper Zero, you can visit the Flipper Official website, where the product is abundant. Flipper Zero has no service in India, instead of which users can use etsy to buy Flipper Zero.

The Brazilian Government has seized the purchases of Flipper Zero, as many threat actors are using it for alleged criminal activities. The sellers in Brazil claimed that despite all attempts to certify the device, the Brazilian National Telecommunication agency had rejected the device.

As per reports, it is still unclear whether this ban is a temporary or a permanent ban from the platform. Following this, there might be bans from other e-commerce platforms also.

Struggling to Apply The Security Patch in Your System? – 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...