BrickerBot threatens to kill your IoT devices
Mirai-like botnet could permanently disable Internet of Things hardware
A new type of malware has been discovered that could permanently render IoT devices useless.
Dubbed BrickerBot, the malware was discovered by IT security firm Radware. Its Emergency Response Team (ERT) said it was designed to stop a victim's hardware from functioning.
It called this new type of attack a Permanent Denial-of-Service (PDoS), and said itis becoming increasingly popular in 2017 as more incidents evolving this hardware-damaging assault occur.
The type of attack is also known as "plashing"; damaging a system so badly that it requires replacement or reinstallation of hardware.
"By exploiting security flaws or misconfigurations, PDoS can destroy the firmware and/or basic functions of [a] system. It is a contrast to its well-known cousin, the DDoS attack, which overloads systems with requests meant to saturate resources through unintended usage," said Pascal Geenens, cyber security evangelistat Radware, who discovered the malware.
In just one four-day period, a honeypot set up by the company recorded 1,895 PDoS attempts performed from several locations around the world. The firm said the malware's sole purpose was to target IoT devices and corrupt their storage.
The malware used Telnet brute force - the same exploit vector used by Mirai - to breach a victim's devices, according to the researchers. Bricker does not try to download a binary, so no complete list of credentials that were used for the brute force attempt has been recorded. However, Radware was able to record that the first attempted username/password pair was consistently 'root'/'vizxv.
"Upon successful access to the device," said Geenens, "the PDoS bot performed a series of Linux commands that would ultimately lead to corrupted storage, followed by commands to disrupt internet connectivity, device performance, and the wiping of all files on the device."
When a device is successfully accessed, the malware carries out a series of Linux commands that would ultimately lead to corrupted storage, followed by commands to disrupt internet connectivity, device performance, and the wiping of all files on the device.
"Among the special devices targeted are /dev/mtd (Memory Technology Device - a special device type to match flash characteristics) and /dev/mmc (MultiMediaCard - a special device type that matches memory card standard, a solid-state storage medium)," he said.
"The sysctl commands attempt to reconfigure kernel parameters: net.ipv4.tcp_timestamps=0 disables TCP timestamps, which does not affect local LAN IPv4 connectivity, but seriously impacts the internet communication, and kernel.threads-max=1 limits the max number of kernel threads to one."
Organisations can protect IoT devices and networks by changing the device's factory default credentials and disabling Telnet access to the device, Radware explained.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now