Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

BrickerBot

From Wikipedia, the free encyclopedia
Destructive malware targeting IoT devices

BrickerBot wasmalware that attempted topermanently destroy ("brick") insecureInternet of Things devices. BrickerBot logged into poorly-secured devices and ran harmful commands to disable them. It was first discovered byRadware after it attacked their honeypot in April 2017. On December 10, 2017, BrickerBot was retired.

The most infected devices were in Argentina, followed by North America and Europe, and Asia (including India).[1]

Discovery

[edit]

BrickerBot.1 and BrickerBot.2

[edit]

The BrickerBot family of malware was first discovered byRadware on April 20, 2017, when BrickerBot attacked theirhoneypot 1,895 times over four days. BrickerBot's method of attack was to brute-force thetelnet password, then run commands usingBusyBox to corruptMMC andMTD storage, delete all files, and disconnect the device from the Internet. Less than an hour after the initial attack, bots began sending a slightly different set of malicious commands, indicating a new version, BrickerBot.2. BrickerBot.2 used theTor network to hide its location, did not rely on the presence of busybox on the target, and was able to corrupt more types of storage devices.[2]

BrickerBot.3 and BrickerBot.4

[edit]

BrickerBot.3 was detected on May 20, 2017, one month after the initial discovery of BrickerBot.1. On the same day, one device was identified as a BrickerBot.4 bot. No other instances of BrickerBot.4 were seen since.[3]

Shutdown and Impact

[edit]

According to Janit0r, the author of BrickerBot, it destroyed more than ten million devices before Janit0r announced the retirement of BrickerBot on December 10, 2017.[4] In an interview withBleeping Computer, Janit0r stated that BrickerBot was intended to prevent devices from being infected byMirai.[5][6]US-CERT released an alert regarding BrickerBot on April 12, 2017.[7]

References

[edit]
  1. ^"BrickerBot: "The Doctor's" PDoS Attack Has Killed Over 2 Million Insecure Devices".Fossbytes. April 25, 2017.
  2. ^""BrickerBot" Results In PDoS Attack".Radware. April 5, 2017. RetrievedFebruary 26, 2018.
  3. ^"BrickerBot PDoS Attack: Back With A Vengeance".Radware. April 21, 2017. RetrievedFebruary 26, 2018.
  4. ^Shattuck, Justin (December 28, 2017)."BrickerBot: Do "Good Intentions" Justify the Means—or Deliver Meaningful Results?".F5 Labs. RetrievedJanuary 21, 2019.
  5. ^Cimpanu, Catalin (December 11, 2017)."BrickerBot Author Retires Claiming to Have Bricked over 10 Million IoT Devices".BleepingComputer. RetrievedAugust 4, 2018.
  6. ^Olenick, Doug (December 12, 2017)."BrickerBot creators announce retirement from active operations".SC Media US. RetrievedAugust 4, 2018.
  7. ^"BrickerBot Permanent Denial-of-Service Attack (Update A) | ICS-CERT".ICS-CERT. April 18, 2017. RetrievedFebruary 26, 2018.
Internet of things (IoT) malware
Notable IoT malware
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=BrickerBot&oldid=1164665570"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp