Beware of ‘BrickerBot’, the Destroyer of Unsecure Internet Devices – Homeland Security

A new kind of attack is targeting unsecured Internet of Things devices by scrambling their code and rendering them useless.

Security firm Radware first spotted the newly found “BrickerBot” malware last month after it started hitting its own honeypots, logging hundreds of infection attempts over a few days. When the malware connects to a device with their default usernames and passwords — often easily found on the internet — the malware corrupts the device’s storage, leading to a state of permanent denial-of-service (PDoS) attack, also known as “bricking.”

In other words, this attack “damages a system so badly that it requires replacement or reinstallation of hardware,” said Radware.


It’s a novel take on an ongoing security problem with Internet of Things devices: Botnets controlled by hackers, like the Mirai malware, typically infect unsecured devices that are enlisted as part of wider bandwidth-stealing attacks to bring down websites and services by overwhelming them with internet traffic.

Like the Mirai botnet, most famous for bringing down wide swathes of the US internet last year in a massive distributed denial-of-service (DDoS) attack, the BrickerBot also uses “the same exploit vector” by brute-forcing telnet accounts with lists of available usernames and passwords.

Radware doesn’t have a list of internet-connected devices, like webcams, toys, and even smart bulbs, at risk of being attacked, but it pointed to several kinds of Linux-based devices that run the BusyBox toolkit that have their telnet port open and are exposed publicly on the internet.

The researchers said that the attackers also have an affinity for targeting devices on Ubiquiti networks, which have been targeted by attackers before.

Once inside, the malware runs a sequence of commands, which “try to remove the default gateway, wipe the device through rm -rf /* and disable TCP timestamps as well as limiting the max number of kernel threads to one,” which would scramble the device’s memory.

The researchers also said that the malware adds extra commands “to flush all IP tables firewall and NAT rules and add a rule to drop all outgoing packets,” effectively wiping any trace of its infection.

“Unfortunately, even after performing the factory reset, the camera was not recovered and hence it was effectively bricked,” said Radware.



Comments

Popular posts from this blog

How To Hack WIFI WPS pin With Kali Linux

World’s Fastest Camera Takes 5 Trillion Photos Per Second, Can Pause Moving Light

I'm Loyal to Nothing Except the Dream