"Sanitary Internet of things" remotely "kills" vulnerable devices

28 April 2017, 18:10 | Technologies 
фото с InternetUA

The hacker, hiding under the nickname The Janitor, developed several versions of the malicious software BrickerBot, hitting the Internet of things. "Worm" remote disabled IoT-gadgets, damaging Linux BusyBox core and erasing flash memory.

BrickerBot found Internet devices with an open Telnet port and selected credentials using the bruteforce method. Having picked up the "keys", the virus remotely disconnected devices, including web cameras, erasing their internal memory, which made them unusable for later use. The first version of BrickerBot already attacked a thousand devices, the second - damaged a thousand more.

Who exactly is behind the creation of BrickerBot - unknown. According to the author of malicious software, in this way he tries to draw public attention to the security problem of IoT gadgets. "Like many others, I was alarmed by the uncontrolled DDoS attacks from IoT botnets in 2016. I was sure that these major attacks will force the industry to finally act together, "writes BrickerBot.

Nevertheless, subsequently the developer was disappointed with the manufacturers, as it turned out that this "problem can not be solved quickly enough by the usual means". As a result, The Janitor decided to create a virus that "kills" the IoT-device in order to stimulate companies to the speedy release of "patches". "I view my project as a kind of 'Internet chemotherapy'," he said..

Источник: InternetUA