
A new malware strain called BrickerBot is bricking Internet of Things (IoT) devices around the world by corrupting their storage capability and reconfiguring kernel parameters.
Detected via honeypot servers maintained by cyber-security firm Radware, the first attacks started on March 20 and continued ever since, targeting only Linux BusyBox-based IoT devices.
Right from the get-go, two different versions of BrickerBot were detected: BrickerBot.1 and BrickerBot.2.
In the first stages of the attacks, both strains work in a similar way, by attempting a dictionary brute-force attack on devices with Telnet ports left open on the Internet.
Just like Mirai, Hajime, LuaBot, and other IoT malware, BrickerBot uses a list of known default credentials used for various IoT devices.
If device owners failed to change their default credentials, BrickerBot logs in and performs a series of Linux commands.
This is where the two versions differentiate, as each version's set of commands is different, but in the end, accomplish the same goal. These commands will:
![]() | ![]() |
The end result is a bricked IoT device that will stop working within seconds of getting infected. Experts call these attack PDoS (Permanent Denial of Service), but they are also known as "phlashing."
According to telemetry data, just one of Radware's honeypots has seen 1,895 PDoS attempts in the span of four days.
The company's experts say the two BrickerBot variants are distributed via two different infrastructures. Currently, attacks with BrickerBot.1 are being launched from IPs from all over the world, which appear to be assigned to Ubiquiti network devices, such as access points and bridges, which all run an older version of the Dropbear SSH server.
Attacks from BrickerBot.2, the more advanced version of the BrickerBot malware family and the one that executes more commands, are hidden behind Tor exit nodes, and are almost impossible to trace back to their origin. The good news is that this more advanced version was only responsible for 333 PDoS attacks, far less than the ones with BrickerBot.1.
All in all, BrickerBot isn't like anything we've seen before in the landscape of IoT malware. Most IoT malware strains try to hoard devices in massive botnets that are then used as proxies to relay malicious traffic or to launch DDoS attacks. Both of these are lucrative businesses for any cyber-criminal talented enough to hijack large numbers of IoT equipment.
BrickerBot's destructive capabilities are something new, which don't benefit anyone. Not BrickerBot's author, and certainly not the device owner, who'll have to reinstall firmware, or even worse, buy a new device.
BrickerBot could also be the work of an Internet vigilante that wants to destroy insecure IoT devices. A similar malware strain first appeared in October 2015.
CalledLinux.Wifatch, this IoT malware strain took over insecure routers and then executed commands that improved the device's security. The creators of this malware open-sourced the codeon GitLab, also explaining the reasons why they created the malware to begin with, claiming they had no bad intentions.
The same cannot be said for BrickerBot's author, who clearly is intent on wiping as much of unsecured IoT devices as he can.
"Wow. That's pretty nasty," said Cybereason security researcherAmit Serper after Bleeping Computer showed him Radware's security alert. "They're just bricking it for the sake of bricking it. [They're] deliberately destroying the device."
"It's someone who wanted the clean up the mess in a harsh way," saidVictor Gevers, chairman of the GDI.foundation, a security expert that tracked thedestructive ransom attacks against MongoDB servers that took place at the start of the year.
"Very effective and in some point very risky because attacking devices without knowing their exact duty could be dangerous," Gevers added. "Imagine you disable a security camera of an embassy. Is that an act of aggression towards a country?"
BrickerBot's approach is definitely illegal and dangerous, as Gevers points out. The researcher also doesn't agree with the attackers' approach.
"These attacks are very easy to execute, and I think this just the beginning," the expert told Bleeping Computer. "I don't want to label this work as dark, but I think there are less destructive ways to achieve the same goal."
"Instead of bricking you could also allow the devices to still work and just patch the vulnerability. This requires a bit more finesse."
So Gevers is making a proposition for the BrickerBot authors.
As chairman of theGDI.foundation I would like to thank the ones behind this. Your message of "awareness" was received loud and clear. I would appreciate it if they approached us so we might work together getting the rest [of the insecure IoT devices] offline as well, but a little bit more constructive.
Gevers' proposition is in line with his foundation's work, which has been spending countless man hours trying to alert companies about unsecured servers left exposed online.
TheRadware security alert containing the technical details of BrickerBot's modus operandi is available here.
Modern IT infrastructure moves faster than manual workflows can handle.
In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
Fake job recruiters hide malware in developer coding challenges
LummaStealer infections surge after CastleLoader malware campaigns
New Linux botnet SSHStalker uses old-school IRC for C2 comms
North Korean hackers use new macOS malware in crypto-theft attacks
Malicious 7-Zip site distributes installer laced with proxy tool
Not a member yet?Register Now
Enhance IBM QRadar with real-time IP threat intelligence from Criminal IP
Overdue a password health-check? Audit your Active Directory for free
Are your credentials in stealer logs? Scan your organization's credential exposure now.
Discover how to scale IT infrastructure reliably without adding toil or burnout

Build cyber resilience with Wazuh: The open-source SIEM & XDR for proactive protection