With the help of the "hacker multitool" Flipper Zero, you can hack traffic lights

Carding 4 Carders

Professional
Messages
2,731
Reputation
13
Reaction score
1,375
Points
113
A Canadian engineer recorded a detailed video instruction on how to always drive through a green light.

Flipper Zero is a portable multifunction device designed for IoT pentest and wireless access control systems. The device is capable of reading, copying, and emulating radio frequency tags, remote controls, and digital access keys.

Flipper Zero was developed by creative guys from Russia who thought of combining a hacker device with tamagotchi by embedding it in a cyberdelfin device. Flipper Zero was first introduced to the Internet at the end of 2019.

On February 12, Canadian engineer and inventor Peter Fairley demonstrated on his YouTube channel how Flipper Zero can remotely and automatically switch traffic lights directly from the car interior. This way, you can always go to the green traffic light and not stand in traffic jams.

Special devices for "Traffic signal preemption", designed for switching traffic light signals by emergency services in many countries of the world, use special optical technology for transmitting infrared light in their work.

In essence, the technology works by detecting a specific spectrum of infrared radiation that is transmitted by a mobile infrared transmitter (MIRT) installed, for example, in an ambulance. When the receiver on the traffic light pole detects the desired signal, the road system switches all traffic lights at the intersection at once so that the desired car passes out of turn, without allowing an emergency.

Since Flipper Zero does not contain a MIRT transmitter in its design and cannot directly generate powerful infrared pulses, the aforementioned Canadian came up with a slightly different way to implement his plan. Fairley taught his multitool how to simulate a MIRT transmitter with the help of improvised tools.

The Canadian connected a powerful infrared LED matrix to his Flipper Zero and programmed the device to generate pulses with a frequency of 14 Hz. The inventor pulled out the matrix from an old video surveillance camera. But the signal generator was already built into the "hacker multitool", so no additional firmware improvements were needed. In his YouTube video, Fairley explained in detail how the technology itself works and how his "rework" with the connected LED matrix works. He also demonstrated the device in operation.

Creating and using such transmitters for personal purposes is illegal. However, the inventor stated the following: "My video is just a proof of concept. I've already received feedback about my device from a volunteer fire department that was just looking for a low-cost solution to equip its staff. The 3M OptiCom devices that GTT sells to city fire departments cost $ 5,000 each. Not all firefighters have that kind of money." Thus, the Canadian made a contribution to saving human lives with his refinement of Flipper Zero.

It's funny what a tamagotchi multitool can do in skilled hands. Let's hope that after the release of this video, attackers will not start exploiting road systems that use the "traffic displacement"technology for their own purposes.

+++

Developers of the Xtreme alternative firmware for the hacker multitool Flipper Zero, also known as "tamagotchi for hackers", have added the function of" spam attacks " of Android and Windows devices via Bluetooth, writes Bleeping Computer.

A separate BLE Spam application, which will be included in the next version of the firmware, allows you to bring down a wave of BLE connection requests to some of the devices with Bluetooth Low-Energy support in the Flipper Zero coverage area.

As a result, owners of these devices will see more and more notifications appear on the screen. Thus, you can not only mislead the user about which of the sent requests is "real", but also actually temporarily disable the gadget.

Xtreme firmware developers released a video that demonstrated the effect of an attack on a Samsung Galaxy smartphone, in which the user cannot interfere with the device's operation due to continuously incoming notifications, while not resorting to restarting the device.

The author of the YouTube channel Talking Sasquach tested the test version of the firmware in action and confirmed the functionality of the "spam attack" function in situations where Android and Windows devices are "targets".

It also works with Apple gadgets

The BLE Spam app also supports a similar method of attacking Apple devices.

In September 2023, security researcher Techryptic demonstrated a way to attack owners of Apple devices (iPhone, iPad) with a continuous stream of Bluetooth notifications. To do this, we used Flipper Zero, which can be taught to send fake ADV packets within Bluetooth range, simulating a request to connect to a device.

ADV packages are used in the Apple ecosystem to exchange information between devices, for example, using the AirDrop protocol.

How to protect yourself from an attack

Bleeping Computer notes that the risk of such attacks is actually not very high, since it is impossible to use it to execute arbitrary code on the target device or cause direct damage to it. They are more a way to trick someone than a real attack vector.

However, there is still a risk of using this technique for phishing purposes, so it is important to know how to protect yourself in case of being hit.

In Android 14 and Windows 11, notifications are enabled by default when you receive a request to pair devices via Bluetooth, so these systems are initially vulnerable to an attack by "pranksters" armed with Flipper Zero.

Fortunately, disabling these notifications won't be too difficult, even for a novice user.

In firmware running Android OS, it is enough to find the Google->"Sharing with the environment" sections in the "Settings"and deactivate the "Show notification (When devices nearby can share content" switch).

In Windows 11, a similar result can be achieved by going to "Settings" -> "Bluetooth and Devices" -> "Devices" and setting the "Show notifications for connecting using fast communication" switch to the "Off" position.
 
Top