SAY HI TO CHERNOBYL!

By using malicious USBs, it only requires a few seconds to infect an entire network. We felt the need to change that, which is why we created Chernobyl, a fully customizable software and hardware platform that can identify threats before your whole customer database and blueprints are auctioned on a darknet marketplace. We have made this possible by using threat intelligence from the darknet and the very best hardware to create a device that adopts the same tactics, techniques and procedures as the cyber villain’s that want to steal your data and destroy your business. By using Chernobyl, you will be able to find flaws in your system and secure your business before something detrimental happens.


LET'S TALK ABOUT FEATURES

Only your imagination sets the limits for what Chernobyl can accomplish, however we would like to give you some ideas about how it can be configured and showcase its amazing capacities.



 

Stealth

Within two seconds Chernobyl will deplete any protection and open a terminal that hides the entire process.



 

Crypter

Turns any executable file into a fully legitimate process.

 


 

Password Retrieval

Extract credentials from most applications within 15 seconds, including all browsers.



 

Crypto Wallets

Pickpocketing for the modern cyber era, unlocks most electronic wallets.



 

Live Recording

See what's going on the desktop or why not enable the webcam to watch the surroundings?



 

Search History

Recovers detailed information about web browsing history, even in privacy mode.

 
 


 

Call Recorder

Wiretapping of VoIP applications, including real-time surveillance options



 

Tsar Bomba

Super detonation, spreading Chernobyl and infecting all connected computers on a network.

 
 


 

Bye-Bye Anti Virus

Besides by-passing an anti-virus, Chernobyl can also turn off and remove the anti-virus software completely.



 

Keylogger

Chernobyl can record any keyboard input without any compromises.

 
 


 

Express Delivery

FTP delivery? E-mail? No problems, Chernobyl offers many different delivery options.



 

Multi platform support

Any Windows device, most Linux distributions, many Android devices and limited support for OSX/Unix/IOS.

ENGINEERED FOR PERFORMANCE

The Chernobyl hardware platform is the result of an extraordinary effort by Jiggsoft’s engineers. It is powered by a high performance, low power AVR micro-controller based on advanced RISC architecture. However, the most interesting aspect isn't about its speed, even if the Chernobyl can be configured to use chips up to 400 MHz. The real magic is the USB 2.0 Full-speed/Low Speed Device Module, which enables the Chernobyl to pretend to be a common, inoffensive USB device and adjust the speed of payload execution in line with the target computer.

 


Information and cyber security casestudy

 

Weather Resistant



Information and cyber security casestudy

 

16 Mhz



Information and cyber security casestudy

 

Weight 9.0 g

 


Information and cyber security casestudy

 

Arduino platform



Information and cyber security casestudy

 

SD-card reader



Information and cyber security casestudy

 

56.2*20*10.33mm

 






It takes an extraordinary factory to build extraordinary products.
Each Chernobyl is assembled by hand in Carlisle, United Kingdom.

 
 


What's next?

We have a four-step approach to meeting our clients’ need



Order

Tell us what you need and we will get back to you promptly



Configuration

Our team will prepare a device customized to your needs




Delivery

Upon payment the device will be shipped on same day




Consulting

We will help you with eventual modifications and updates


 


Each Chernobyl is a unique product that includes custom software designed to meet your demands, therefore it can only be purchased as part of a consulting contract. Our offer includes everything; from programming the device, to supplying you with updated features and helping you with a strategy to avoid attacks from happening. Our pricing is reasonable, for just 500 £ we can offer you a fully custom designed USB attack platform with basic functionality. Just fill in the form below and one of our specialists will get in touch with you as soon as possible!

Hello Jiggsoft,

My is and

my is

I would to know