“A Window Into Your Home”


  • 6

“IoT Devices Beware: The BrickerBot”

Dear Blast Readers,

 

Do you leave your IoT (Internet of Things) Devices connected to the internet? Did you know that if you leave you IoT devices connected to the internet, even when you are not using them, it opens doors allowing hackers more time to gain control of your devices? Did you know that there is a form of malware that leaves your device impossible to use once infected?

 

A BrickerBot is a form of malware that has been created to infect a collection of devices. The “Bricker” in “BrickerBot” is referring to rendering a device, or devices, completely useless or inoperable, like a brick used as a paperweight. This is accomplished when the BrickerBot corrupts the device’s storage capabilities.

 

The way in which BrickerBots behave do not always match up with the behavior of traditional botnets. A botnet is a network of devices that have been infected. Their purpose is to keep the infected devices around for as long as possible.

 

Most botnets can be used for:

  • Sending out spam.
  • DDoS Attacks (also known as “Distributed Denial of Service Attacks”).
  • Phishing Attacks.

 

BrickerBot Malware uses a “Permanent Denial of Service” attack or PDDoS attack. This is when the BrickerBot physically disables the device.

 

How?

 

The device is physically disabled when the BrickerBot corrupts the firmware on the devices. Usually the only way to fix this is to replace the device, or if possible re-install the firmware.

 

BrickerBots use a set of commands to help accomplish their end goal of “Bricking” your smart devices. These commands will:

  • Render Flash storage useless by writing random bits to the storage drives on the devices.
  • Disabling TCP Time stamps, leaving connectivity vulnerable.
  • Limiting the processes that the devices can run at once.

 

How are you supposed to protect yourself from a BrickBot?

To protect yourself and your IoT Devices from BrickBots, you should:

  • Change your login information (BrickBots come with a dictionary containing default login information).
  • Limit the internet connectivity your device has. (Leaving your IoT devices connected, especially when you are not using them, gives hackers more time to take control and infect your devices.)
  • Install updates as frequently as they become available.

 

It is important to remember:

  • Every device that is smart and/or has internet connectivity should have STRONG PASSWORDS.
  • Take security into your own hands, do not rely on default security from the manufactures. (Remember: BrickBots come with a dictionary that contains default login information. Changing your login information should make your devices harder to hack.)

 

If you have any questions relating to IoT Devices, IoT Security, Hacking, Cyber Security or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.



  • 0

“Television: A Hackers Window Into Your Home

Dear Blast Readers,

 

It has happened. Your home has been invaded. The one place you thought that you were safe from anything malicious has been breached, and it is because of your smart TV. Smart TVs, being one of the most popular devices, present new security risks for users.

 

Hackers can gain access to your home through your TV, and they wouldn’t even need physical access to do so. The only thing that they would need is a “Low-Cost Transmitter”.  A “Low-Cost Transmitter” can easily be purchased online through third party vendors such as Amazon or EBay.

 

With this device, a hacker would be able to send radio signals that can be picked up by your Smart TV and any others within range of the transmitter. When the TV picks up the signal, the hacker has complete and total control of that TV. This then allows the hacker to get privileged access to the TV. Once access is gained, the hacker can cause chaos and harm in many ways, including:

  • The hacker could spy on you through the TVs camera and speaker.
  • The hacker could attack your other Internet connected devices such as: Computers, Tablets and Smartphones.
  • Hackers can access your stored credentials and personal data, putting your identity at risk.

 

Typically, infections are in the temporary memory. The steps to secure your devices varies from product-to-product. Some ways to protect yourself and your data include:

  1. Restart your device regularly.
  2. Secure your router.
  3. Be smart with your web-connected devices.
  4. Check firmware updates (manually if it does not automatically check for updates).
  5. Be vigilant for irregular activity occurring on your network.
  6. Place a piece of tape over your TV’s camera for a low-tech way to ensure privacy.

 

If you have any questions relating Security Risks and Cyber Security contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.