Original Article Text

Click to Toggle View

Flipper Zero can now spam Android, Windows users with Bluetooth alerts. A custom Flipper Zero firmware called 'Xtreme' has added a new feature to perform Bluetooth spam attacks on Android and Windows devices. A security researcher previously demonstrated the technique against Apple iOS devices, inspiring others to experiment with its potential impact on other platforms. The main idea behind the spam attack is to use Flipper Zero's wireless communication capabilities to spoof advertising packets and transmit them to devices in range of pairing and connection requests. This type of spam attack can confuse the target, make it difficult to discern between legitimate and spoofed devices, and even disrupt the user experience with non-stop notifications popping up on the targeted device. Xtreme adds "Bluetooth spam" Earlier this month, Flipper Xtreme announced on its Discord channel that "spam attacks" are coming in the next major firmware release. The admins even shared a demo video showcasing a denial of service (DoS) attack on a Samsung Galaxy device, where a constant feed of connection notifications renders the device unusable. Although the latest firmware hasn't reached stable status, the "spam attack" has been incorporated into the latest development build via a new app named 'BLE Spam,' available on GitHub. YouTuber 'Talking Sasquach' gave the dev firmware image a spin on his Flipper Zero and reported that the attack works as expected on Windows and Android. The BLE Spam app currently gives users eight flood attack options, including: Choosing any of the above causes Flipper Zero to begin broadcasting the corresponding Bluetooth packets to pop-up connectivity prompts and notifications on devices in range. How to block these spam attacks These attacks are more of an annoyance rather than a real threat. However, as BLE Spam allows users to craft custom notifications, these spams can get creative and trickier, playing a role in social engineering or other threat scenarios. Android 14 and Windows 11 devices, by default, display notifications on Bluetooth connection requests, so these Flipper Zero attacks could cause problems. Thankfully, there's an easy way to block these notifications on both systems. On Android, head to Settings → Google → Nearby Share, and turn the toggle on Show notification to the "Off" position. The same menu can be accessed through Settings → Connected Devices → Connection preferences → Nearby Share. On Windows, open Settings, select 'Bluetooth & devices' from the menu on the left, then click on 'Devices,' scroll down to 'Device settings,' and turn the 'Show notifications to connect using Swift Pair' toggle to the 'Off' position. Users shouldn't be too worried about rogue broadcasts of this kind, as these cannot perform code execution on recipient devices or cause direct harm. However, noting the potential for phishing is crucial, and knowing how to stop the notifications in cases of persistent pranking can save people time and frustration.

Daily Brief Summary

CYBERCRIME // New Flipper Zero Firmware Capable of Bluetooth Spam Attacks on Android and Windows Devices

The customized firmware, Flipper Zero 'Xtreme', has added a feature that allows Bluetooth spam attacks on Android and Windows devices, previously seen only on Apple iOS devices.

This type of spamming involves spoofing advertising packets and transmitting them to devices in range, causing confusion and potential disruption to user experience with repeated notifications.

The 'spam attack' feature has been included in the latest development build, allowing users eight options for flood attacks.

However, these attacks are more annoying than dangerous as they cannot perform code execution or cause direct harm to recipient devices.

Despite not posing a serious threat, the creative nature of these spam messages can play a role in social engineering or other scam scenarios.

Easy steps can be taken to block these notifications on Android and Windows systems, alleviating potential frustrations.

As these spam attacks could potentially be used for phishing attempts, it remains essential to understand how to manage and stop notifications.