Lock and Code

Meet the entirely legal, iPhone-crashing device: the Flipper Zero


Listen Later

It talks, it squawks, it even blocks! The stocking-stuffer on every hobby hacker’s wish list this year is the Flipper Zero.

“Talk” across low-frequency radio to surreptitiously change TV channels, emulate garage door openers, or even pop open your friend’s Tesla charging port without their knowing! “Squawk” with the Flipper Zero’s mascot and user-interface tour guide, a “cyber-dolphin” who can “read” the minds of office key fobs and insecure hotel entry cards. And, introducing in 2023, block iPhones running iOS 17!

No, really, for a couple of months near the end of 2023, this consumer-friendly device could crash iPhones (a vulnerability that Apple fixed in a software update in mid-December), and in the United States, it is entirely legal to own.

The Flipper Zero is advertised as a “multi-tool device for geeks.” It’s an open-source tool that can be used to hack into radio protocols, access control systems, hardware, and more. It can emulate keycards, serve as a universal remote for TVs, and make attempts to brute force garage door openers.

But for security researcher Jeroen van der Ham, the Flipper Zero also served as a real pain in the butt one day in October, when, aboard a train in the Netherlands, he got a popup on his iPhone about a supposed Bluetooth pairing request with a nearby Apple TV. Strange as that may be on a train, van der Ham soon got another request. And then another, and another, and another.

In explaining the problem to the outlet Ars Technica, van der Ham wrote:

“My phone was getting these popups every few minutes and then my phone would reboot. I tried putting it in lock down mode, but it didn’t help.”

Later that same day, on his way back home, once again aboard the train, van der Ham noticed something odd: the iPhone popups came back, and this time, he noticed that his fellow passengers were also getting hit.

What van der Ham soon learned is that he—and the other passengers on the train—were being subjected to a Denial-of-Service attack, which weaponized the way that iPhones receive Bluetooth pairing requests. A Denial-of-Service attack is simple. Essentially, a hacker, or more commonly, an army of bots, will flood a device or a website with requests. The target in these attacks cannot keep up with the requests, so it often locks up and becomes inaccessible. That can be a major issue for a company that is suffering from having its website attacked, but it’s also dangerous for everyday people who may need to use their phones to, say, document something important, or reach out to someone when in need.

In van der Ham’s case, the Denial-of-Service attack was likely coming from one passenger on the train, who was aided by the small, handheld device, the Flipper Zero.

Today, on the Lock and Code podcast, with host David Ruiz, we speak with Cooper Quintin, senior public interest technologist with Electronic Frontier Foundation—and Flipper Zero owner—about what the Flipper Zero can do, what it can’t do, and whether governments should get involved in the regulation of the device (that’s a hard “No,” Quintin said).

“Governments should be welcoming this device,” Quintin said. “Every government right now is saying, ‘We need more cyber security capacity. We need more cyber security researchers. We got cyber wars to fight, blah, blah, blah,’ right?”

Quintin continued:

“Then, when you make this amazing tool that is, I think, a really great way for people to start interacting with cybersecurity and getting really interested in it—then you ban that?”

Tune in today.

You can also find us on Apple PodcastsSpotify, and whatever preferred podcast platform you use.

For all our cybersecurity coverage, visit Malwarebytes Labs at malwarebytes.com/blog.

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License

http://creativecommons.org/licenses/by/4.0/

Outro Music: “Good God” by Wowa (unminus.com)

...more
View all episodesView all episodes
Download on the App Store

Lock and CodeBy Malwarebytes

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

48 ratings


More shows like Lock and Code

View all
Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,244 Listeners

Fresh Air by NPR

Fresh Air

38,491 Listeners

Marketplace by Marketplace

Marketplace

8,789 Listeners

On Point with Meghna Chakrabarti by WBUR

On Point with Meghna Chakrabarti

4,020 Listeners

WSJ Tech News Briefing by The Wall Street Journal

WSJ Tech News Briefing

1,658 Listeners

Science Friday by Science Friday and WNYC Studios

Science Friday

6,440 Listeners

Click Here by Recorded Future News

Click Here

417 Listeners

Stay Tuned with Preet by Preet Bharara

Stay Tuned with Preet

32,396 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,075 Listeners

Sean Carroll's Mindscape: Science, Society, Philosophy, Culture, Arts, and Ideas by Sean Carroll

Sean Carroll's Mindscape: Science, Society, Philosophy, Culture, Arts, and Ideas

4,163 Listeners

Unpacking Israeli History by Unpacked

Unpacking Israeli History

1,226 Listeners

Call Me Back - with Dan Senor by Ark Media, Ilan Benatar

Call Me Back - with Dan Senor

3,332 Listeners

On with Kara Swisher by Vox Media

On with Kara Swisher

3,561 Listeners

Main Justice by MS NOW, Andrew Weissmann, Mary McCord

Main Justice

7,031 Listeners

Ask Haviv Anything by Haviv Rettig Gur

Ask Haviv Anything

908 Listeners