Flipper Zero's Advertising Campaign For Cloning Access Control

Published May 03, 2024 12:03 PM

Flipper Zero increases the risks of access control hacks, which we have tested. They already have a booming business, and now the company's social media advertising campaign is emphasizing cloning access control cards.

IPVM Image

In this note, we examine the advertisements and demonstrations on several of Flipper Zero's social media pages, including the risks and responses from the company.

For background, see:

Flipper **** ************** / ***** ********** ********

*******'* *** *** ****** ***** ***** highlight *** ******'* ********* ** ******* such *************** ** ***** *********** (*** ****'* ****), ********** *** ******** ****** *** insecure / ******* ***********. *****, ** list ******* ****** *** *** ************* its ******* ** ***** ** **** entry ** * ******** ***** * Flipper ****.

** *********, ******* ****'* ******** **** is ******* * ********* **, ************ Flipper's ******* ** ******* *** **** credentials, "***** **** **** ****** **** again," "***** ****" **** * ****** shop **** ** *** ******* ******* to ******** * ******:

****, ******* ********* ** **** ** running ** *** **** *********, **** the *******, "**** *** *** ***** with ******* ****":

***** ** *** ************* ***** ***, showing *** ******** *******, **** **** shop *****:

IPVM Image

*** ** ******* ** ******** ***** that ******* **** *** **** ** results:

IPVM Image

****, * **** **** *** **** 800,000 ***** ** ********* ***** *** to **** / ******* *********** *** then ***** ** ** * **********:

****, ******* **** **** *** ****** 600,000 ***** ***** ********* *** *** / **** ***** *** ******* ** "unlimited" ****** ** ***** (***********):

Executive *******

*** *******, **** ** *** ****-**** scenario ** ***** **************, ** **** companies *** ********* **** ********* **** over ***** ****** ******** **** ******, especially ** ***** ** ****** ********* or ********* *** *** *********** ** they *** ********** ** ****** ***** the ********** **** ***** **** ****** the ******* **** ******.

******* ***** *** *** ******* ***** now *** ******* **** ******** **** other ******* **** *** **** ******* similar ********** / ***************, ***** ** a ******* ********, ** *** **** of ***** *************** ******************* *******.

*******, *** ********** ******* ** **** many ****** ******* ********* ** ******* continue ** **** *** ******* ***** insecure ** ******* *********** (**** ***********, Prox / *** ***), **** ******* Devices *** ****** ******** ********** ****** these ***************.

Flipper **** *** ** ******, *** ***** *** *******

***** **** **** ******* **** ******, the *********** ** ***** * ******* Zero ** ****** ******** **********/***** *** have **** ********** ** ** * single ******, *.*., (****, ****** ****, office, ***, ***) ** **********. *******, the ******* ******** *** ******** ******** on ***** ********* *** ********** *** risks *** "*** ******" ***** ***** devices *** "***."

*** *******, **** ******* ** ***** if / **** **** ** ********* activities, **** ** ** ******** ******* a *********'* **** ** **** ************ access ** ***** **** *** *** (or ** ******) ********** **. ***** Flipper ****'* *** ** *** **** this, ******* ****'* ************ ****** ****** exploiting ****** ******* *******. *** ** this, **** ********* *** ** ******** or******** ******* **** *****.****, ****** ******* **** *** *** ****** Hack ** **** ****.

Flipper **** ********

**** ** ******** **** ******* ******* about ****, *** ******* **** ******** basic / ******* ********** *** *** not ******* ** *** ****** / successful ***** *** **** ** ********** Flipper **** *****:

******* **** ****** *** ***** ** copy ***** *** **** **** ** key ****. * *** *** ****** to **** *** **** ** ** partner's ********, ***** ** *** **** easier **** ****** ** **** *** key. ******* ******* ******** *** ***** of ******* **** *** ********* ************.

(****** **/**/**: ******* ******* ********* **** meant ** *** "******* *******does *** condone the usage of Flipper Zero for nefarious applications." [emphasis added])

*******, *** ******* **** ******* **** are ****** ** **** "*** ******** modern" **********:

******* ****, ***device ** ****** ** **** *** ******** ****** ****** ******* **** ******* ****** ********** **********. [Emphasis added.]

Cracked / ******** *********** ********** *****

** *** ****** ** ***** ****** are *** ******* *** ******** *********** being **** / *********** ***** ***** known ** ******** / ******* *** over * ******. ***** ******* **** may ** *** **** ****** **** / ***** ****** *** ****** ******* hacking, ******* ************ *** ******* ***** used, *** **** *** ******* *** emerging - *** ********, *** "******" credentials *** ***** ***** **** / widely ****.

***, ******* ****'* ********* / ************* campaigns *** ******* *********** ********, *** capitalizing ** *** *** ** ******** or ******** / ****** ***********, ********** the ***** ** ***** *************** ***** exploited *** ** *** ********* ********.

Comments (5)
MR
Malcolm Rutherford
May 03, 2024

*** ******** ** ****** ******* ****** be *******, **** **** ********* ** spoof ************, ***/** **** ****** ************** for ****** ****** *********. *** ** I *** ***** *********** * ***** be ********* ********* ** * *** using * ****** ****** ******.

(3)
UI
Undisclosed Integrator #1
May 03, 2024

******* **** **** ***** **.***** *****. It ******** ******** ******* ** ****, emulate *** ******* ****** ******* *** iClass. ******** *** *** *** ****** harder ** **** *** *** **** read * ***-***** **** **** *** emulate **** ** ** ****** ****, so *** ******** ***** ** **** any ****** **** **** ****** *** in *** ******.

(2)
DD
Dan Droker
May 03, 2024
LONG Building Technologies • IPVMU Certified

******* ******* ******** *** ***** ** Flipper **** *** ********* ************.

******?

(2)
CH
Conor Healy
May 04, 2024
IPVMU Certified

******* ******* ********* ** ** **** meant "**** *** ******* ********* ************." I ******* *** ****** ** ******* this.

RL
Randy Lines
May 06, 2024

***** ******.

**** ** ****** **** *** ******* :

"the ********** ******* is that many access control companies or vendors continue to sell and support known insecure or cracked credentials (most importantly, Prox / 125 kHz), with Flipper ******* *** ****** ******** ********** ****** ***** ***************."

***