Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Wall of Flippers is the way to put a stop to Flipper Zero

Wall of Flippers can block Bluetooth spam attacks from Flipper Zero

byEmre Çıtak
December 25, 2023
in Cybersecurity

Remember Bluetooth spam attacks iPhones suffering for a long time? Well, Wall of Flippers is here to become a remedy for that!

The Flipper Zero, a tiny pen-testing device, has become a darling of the security community. It’s packed with tools for exploring hardware, software, and wireless protocols. But like any powerful tool, it can be misused. Enter the rising tide of Bluetooth spam attacks fueled by Flipper Zero and a growing arsenal of custom firmware. But fear not, for a new hero has emerged: Wall of Flippers.

In September 2023, the world witnessed the birth of Flipper Zero Bluetooth spam. Researchers demonstrated the ability to bombard Apple devices with bogus connection requests, triggering an endless torrent of pop-ups and wreaking havoc on notifications.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

While initially seen as a prank, the potential for more malicious applications loomed large. Soon, custom firmware emerged, expanding the attack canvas to Android and Windows, spamming users with unwanted advertisements, and potentially compromising device security.

How to install Wall of Flippers
Pen-testing tool Flipper Zero was eventually used for Bluetooth spam attacks on the iOS operating system (Image credit)

What is Wall of Flippers?

Wall of Flippers is an open-source Python project offers a beacon of hope. Running on Linux and Windows, Wall of Flippers (WoF) continuously monitors nearby Bluetooth LE activity, alerting users to potential threats and providing valuable information.

Wall of Flippers scans for specific patterns in BLE packets indicative of malicious activity. It currently detects:

  • Flipper Zero activity (BT must be enabled)
  • iOS crash/popup-inducing BLE attacks
  • Android crash/popup-inducing BLE attacks
  • Windows Swift Pair BLE attacks
  • LoveSpouse BLE attacks

Wall of Flippers captures crucial data like the attacker’s MAC address, signal strength, and packet content, empowering users to:

  • Block the offending device
  • Report the attacker
  • Gather evidence for further investigation
How to install Wall of Flippers
Wall of Flipper disrupts Flipper Zero’s operating system (Image credit)

How to install Wall of Flippers

Here’s a step-by-step guide on how to install WoF on Windows:

  1. Install Python:
    • Go to the Python download page and download the latest version of Python for Windows
    • Once the download is complete, run the installation file and follow the prompts to install Python
  2. Install pip:
    • Open a command prompt or terminal window
    • Run the following command to install pip:
      • $ pip install –upgrade pip
  3.  Install bleak:
    • Run the following command to install bleak:
      • $ pip install bleak
  4. Clone the WoF repository:
    • Open a command prompt or terminal window
    • Run the following command to clone the WoF repository:
      • $ git clone https://github.com/K3YOMI/Wall-of-Flippers
  5. Navigate to the WoF directory:
    • CD into the WoF directory:
      • $ cd ./Wall\ of\ Flippers
  6. Run the WoF script:
    • Run the following command to start the WoF script:
      • $ py WallofFlippers.py

If you encounter any issues during the installation process, you can refer to the Wall of Flippers documentation on GitHub for more information.

How to install Wall of Flippers
To install the Wall of Flippers you need Phyton (Image credit)

Is FlipperZero really the bad guy here?

Flipper Zero, a powerful pen-testing tool, has recently come under scrutiny for its role in the Bluetooth spam situation. However, it’s important to recognize that the tool itself is not the root of the problem.

Flipper Zero can be used for both positive and negative purposes, much like any other tool. It’s the intent behind its use that warrants scrutiny, not the tool itself.

One reason why blaming Flipper Zero is overly simplistic is that similar attacks can be launched from multiple platforms. Attackers can use Linux computers or Android devices with specific apps to carry out the same type of attacks. Focusing solely on Flipper Zero ignores these alternative attack vectors and fails to address the larger issue.

Moreover, it’s important to acknowledge that Flipper Zero has legitimate uses in security research, hardware hacking, and exploring wireless protocols. By painting it solely as a tool for nefarious purposes, we downplay its potential benefits and the valuable role it can play in the hands of responsible users.


Featured image credit: Flipper Zero.

Tags: flipper zero

Related Posts

Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025
Hack an iPhone and Apple will pay you up to  million

Hack an iPhone and Apple will pay you up to $5 million

October 10, 2025
Microsoft: Cyber gang hijacks university salaries via Workday accounts

Microsoft: Cyber gang hijacks university salaries via Workday accounts

October 10, 2025
Shinyhunters extorts Red Hat over stolen CER data

Shinyhunters extorts Red Hat over stolen CER data

October 7, 2025

LATEST NEWS

Verizon down: Latest Verizon outage map for service issues

A critical Oracle zero-day flaw is being actively abused by hackers

Microsoft Copilot can now create documents and search your Gmail

Google Messages is about to get a lot smarter with this AI tool

Here is how WhatsApp will let you display your Facebook account

The Windows 10 doomsday clock is ticking for 500 million users

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.