Category : Botnet , BrickerBot , BrickerBot Malware , Computer Forensics , Cyber Attacks , Cyber Security , DDoS Attack , Device Storage , Devices , Distributed Denial of Service Attack , FDS Global , Firmware , Flash Storage , Hack , Hackers , Internet , Internet Connectivity , Internet of Things , Iot , IoT Devices , IoT Security , Malware , Network , Network Security , Password , PDDoS , Permanent Denial of Service , Smart Device , Spam , TCP Time Stamps
Dear Blast Readers,
Do you leave your IoT (Internet of Things) Devices connected to the internet? Did you know that if you leave you IoT devices connected to the internet, even when you are not using them, it opens doors allowing hackers more time to gain control of your devices? Did you know that there is a form of malware that leaves your device impossible to use once infected?
A BrickerBot is a form of malware that has been created to infect a collection of devices. The “Bricker” in “BrickerBot” is referring to rendering a device, or devices, completely useless or inoperable, like a brick used as a paperweight. This is accomplished when the BrickerBot corrupts the device’s storage capabilities.
The way in which BrickerBots behave do not always match up with the behavior of traditional botnets. A botnet is a network of devices that have been infected. Their purpose is to keep the infected devices around for as long as possible.
Most botnets can be used for:
- Sending out spam.
- DDoS Attacks (also known as “Distributed Denial of Service Attacks”).
- Phishing Attacks.
BrickerBot Malware uses a “Permanent Denial of Service” attack or PDDoS attack. This is when the BrickerBot physically disables the device.
The device is physically disabled when the BrickerBot corrupts the firmware on the devices. Usually the only way to fix this is to replace the device, or if possible re-install the firmware.
BrickerBots use a set of commands to help accomplish their end goal of “Bricking” your smart devices. These commands will:
- Render Flash storage useless by writing random bits to the storage drives on the devices.
- Disabling TCP Time stamps, leaving connectivity vulnerable.
- Limiting the processes that the devices can run at once.
How are you supposed to protect yourself from a BrickBot?
To protect yourself and your IoT Devices from BrickBots, you should:
- Change your login information (BrickBots come with a dictionary containing default login information).
- Limit the internet connectivity your device has. (Leaving your IoT devices connected, especially when you are not using them, gives hackers more time to take control and infect your devices.)
- Install updates as frequently as they become available.
It is important to remember:
- Every device that is smart and/or has internet connectivity should have STRONG PASSWORDS.
- Take security into your own hands, do not rely on default security from the manufactures. (Remember: BrickBots come with a dictionary that contains default login information. Changing your login information should make your devices harder to hack.)
If you have any questions relating to IoT Devices, IoT Security, Hacking, Cyber Security or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.