Brickerbot, vigilante software aiming to kill malicious botnets by killing IoT devices

By: ( +David Herron; Date: April 24, 2017

Tags: Security » Iternet of Things » Botnets

The last few months has seen escalating botnet activity on the Internet. The botnet operators are targeting non-existent security in certain Internet of Things devices. Some devices, like wireless security cameras or baby monitors, are not only connected to the Internet, but have gaping security holes. Using those holes, botnet operators have ammassed vast flotillas of Internet devices that can be commanded to attack targets on the Internet. Last fall several attacks, larger than any previously seen, attacked several large sites and even brought down critical Internet infrastructure on a few instances. The Brickerbot appears to be a Botnet purposed with destroying those malicious botnets. One hopes the cure is better than the illness.

According to ArsTechnica, [ArsTechnica1] Brickerbot breaks into Internet of Things devices, just like the malicious botnets. What's different is they permanently disable the device using the commands shown above.

The effect of those commands is to wipe out any disk or flash storage device attached to the computer, to reformat the disks, to delete Internet routing configuration, and then finally reboot the system. Once rebooted the system is incapable of doing anything, and a factory reset is unlikely to return its functionality. In other words, it "bricks" these devices.

According to Radware, [Radware1] the Brikerbot attacks are coming from a limited set of IP addresses that also appear to be Internet of Things devices running Busybox and the Dropbear SSH service. Busybox is an open source utility providing Unix-like command-line tools, and is popular among Internet of Things device makers.

The Brickerbot attack uses the same the same attack vector as the Mirai botnet. Ergo, one assumes the Brickerbot operators are targeting the destruction of Mirai.

The owners of permanently bricked IoT devices might not appreciate the subtleties here. They're the ones who'll have to foot the bill to pay for replacement devices.

ICS-CERT [ICS-CERT] says they're contacting IoT device makers to mitigate the attacks. The actions include changing default credentials on target devices, and disabling Telnet access.

The bottom line question - is Brickerbot a good thing, or a bad thing? Is it a "nasty piece of software"? It destroys the functionality of IoT devices. The side effect is to deny those IoT devices from being used by Mirai, arguably a desired result. But, the basic result is to destroy the devices, causing harm to device owners around the world.

Brickerbot Malware! That can destroy your devices! How? - YouTube

Source: ( TechHelper

In this video you will get information about a dangerous malware! I have explained how it works, which types of devices it can target and how you can save yo...

I've Got My Fingers Crossed - YouTube

Source: ( AT&T Tech Channel

Discussion: 1. Radware: BrickerBot Results In PDoS Attack 2. Robocalling 3. Internet Weather Report Originally recorded April 11, 2017. AT&T ThreatTraq welco...
« Falling through Thin Ice to meet a big fish, Previewing Doctor Who Season 10 Episode 3 Looking back at Multi-Doctor stories in light of upcoming Multi-Master story »
2016 Election Acer C720 Ad block AkashaCMS Amazon Amazon Kindle America Amiga Android Anti-Fascism AntiVirus Software Apple Apple Hardware History Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Astronomy Asynchronous Programming Authoritarianism Automated Social Posting Ayo.JS Bells Law Big Brother Big Finish Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnet Botnets Cassette Tapes Cellphones Christopher Eccleston Chrome Chrome Apps Chromebook Chromebooks Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Clinton Cluster Computing Command Line Tools Comment Systems Computer Hardware Computer Repair Computers Cross Compilation Crouton Cryptocurrency Curiosity Rover Currencies Cyber Security Cybermen Daleks Darth Vader Data backup Data Storage Database Database Backup Databases David Tenant DDoS Botnet Detect Adblocker Developers Editors Digital Photography Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Drobo Drupal Drupal Themes DVD E-Books E-Readers Early Computers Election Hacks Electric Bicycles Electric Vehicles Electron Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Facebook Fake News Fedora VirtualBox File transfer without iTunes FireFly Fraud Freedom of Speech Gallifrey git GitKraken Gitlab GMAIL Google Google Chrome Google Gnome Google+ Government Spying Great Britain Heat Loss Hibernate Hoax Science Home Automation HTTP Security HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS Devices iPad iPhone iPhone hacking Iron Man Iternet of Things iTunes Java JavaScript JavaScript Injection JDBC John Simms Journalism Joyent Kaspersky Labs Kindle Kindle Marketplace Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac OS Mac OS X Machine Readable ID macOS MacOS X setup Make Money Online MariaDB Mars Matt Lucas MEADS Anti-Missile Mercurial Michele Gomez Micro Apartments Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications MODBUS Mondas Monetary System MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Node Web Development Node.js Node.js Database Node.js Testing Node.JS Web Development Node.x North Korea npm NY Times Online advertising Online Community Online Fraud Online Journalism Online Video Open Media Vault Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenVPN Paywalls Personal Flight Peter Capaldi Photography PHP Plex Plex Media Server Political Protest Postal Service Power Control Privacy Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero Recycling Refurbished Computers Remote Desktop Republicans Retro-Technology Reviews Right to Repair River Song Robotics Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking SCADA Scheme Science Fiction Search Engine Ranking Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Shell Scripts Silence Simsimi Skype Social Media Social Media Warfare Social Networks Software Development Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Swagger Synchronizing Files Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Ubuntu Udemy UDOO Virtual Private Networks VirtualBox VLC VNC VOIP Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Website Advertising Weeping Angels WhatsApp Window Insulation Windows Wordpress YouTube YouTube Monetization