BrickerBot was
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
that attempted to
permanently destroy (
"brick") insecure
Internet of Things
Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
devices. BrickerBot logged into poorly-secured devices and ran harmful commands to disable them. It was first discovered by
Radware after it attacked their honeypot in April 2017. On December 10, 2017, BrickerBot was retired.
The most infected devices were in Argentina, followed by North America and Europe, and Asia (including India).
Discovery
BrickerBot.1 and BrickerBot.2
The BrickerBot family of malware was first discovered by
Radware on April 20, 2017, when BrickerBot attacked their
honeypot 1,895 times over four days. BrickerBot's method of attack was to brute-force the
telnet
Telnet (sometimes stylized TELNET) is a client-server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. It is a protocol for bidirectional 8-bit communications. Its main ...
password, then run commands using
BusyBox
BusyBox is a software suite that provides several List of Unix commands, Unix utilities in a single executable file. It runs in a variety of POSIX environments such as Linux, Android (operating system), Android, and FreeBSD, although many of the ...
to corrupt
MMC and
MTD storage, delete all files, and disconnect the device from the Internet. Less than an hour after the initial attack, bots began sending a slightly different set of malicious commands, indicating a new version, BrickerBot.2. BrickerBot.2 used the
Tor network to hide its location, did not rely on the presence of busybox on the target, and was able to corrupt more types of storage devices.
BrickerBot.3 and BrickerBot.4
BrickerBot.3 was detected on May 20, 2017, one month after the initial discovery of BrickerBot.1. On the same day, one device was identified as a BrickerBot.4 bot. No other instances of BrickerBot.4 were seen since.
Shutdown and Impact
According to Janit0r, the author of BrickerBot, it destroyed more than ten million devices before Janit0r announced the retirement of BrickerBot on December 10, 2017. In an interview with ''
Bleeping Computer'', Janit0r stated that BrickerBot was intended to prevent devices from being infected by
Mirai.
US-CERT
The United States Computer Emergency Readiness Team (US-CERT) was a team under the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security.
On February 24, 2023, the Cybersecurity and Infrastructure Security Age ...
released an alert regarding BrickerBot on April 12, 2017.
References
{{Hacking in the 2010s
IoT malware
Cybercrime in India