A new malicious software program targeting Linux-based Internet of Things (IoT) devices, called BrickerBot, has been spotted by cybersecurity vendor Radware.
BrickerBot is similar to Mirai, the destructive malware program that enlists corrupt IoT devices into botnets for denial-of-service (DDoS) attacks. Like Mirai, BrickerBot attacks unsecure devices that have not changed the default username and password.
See also: 5 IoT cybersecurity predictions for the coming year
Once inside the unsecure device, BrickerBot starts to permanently remove the storage and revokes Internet access, effectively killing the unit. This is the major difference between Mirai and BrickerBot; while Mirai uses the corrupt IoT devices, BrickerBot makes them unusable.
It is not known how many devices, if any, have fallen victim to a BrickerBot attack.
The attack does appear to be easy to pull off in theory, as all an attacker would need is remote access to the IoT device. Many of the devices are connected to the Internet through routers that suffer from the same poor authentication and encryption techniques.
Here are a few tips
The firm said it provides five solutions to make avoid a BrickerBot attack:
- Change the device’s factory default credentials.
- Disable Telnet access to the device.
- Network Behavioral Analysis can detect anomalies in traffic and combine with automatic signature generation for protection.
- User/Entity behavioral analysis (UEBA) to spot granular anomalies in traffic early.
- An IPS should block Telnet default credentials or reset telnet connections.
It is another sign that IoT devices need at least basic security to avoid catastrophic damage to commercial and industrial devices. Most manufacturers still lack basic encryption and do not teach users how to change the username and password.