Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 19 submissions in the queue.
posted by n1 on Monday April 10 2017, @11:57PM   Printer-friendly
from the another-brick-in-the-wall dept.

Researchers have uncovered a rash of ongoing attacks designed to damage routers and other Internet-connected appliances so badly that they become effectively inoperable.

PDoS attack bots (short for "permanent denial-of-service") scan the Internet for Linux-based routers, bridges, or similar Internet-connected devices that require only factory-default passwords to grant remote administrator access. Once the bots find a vulnerable target, they run a series of highly debilitating commands that wipe all the files stored on the device, corrupt the device's storage, and sever its Internet connection. Given the cost and time required to repair the damage, the device is effectively destroyed, or bricked, from the perspective of the typical consumer.

Over a four-day span last month, researchers from security firm Radware detected roughly 2,250 PDoS attempts on devices they made available in a specially constructed honeypot. The attacks came from two separate botnets—dubbed BrickerBot.1 and BrickerBot.2—with nodes for the first located all around the world. BrickerBot.1 eventually went silent, but even now the more destructive BrickerBot.2 attempts a log-on to one of the Radware-operated honeypot devices roughly once every two hours. The bots brick real-world devices that have the telnet protocol enabled and are protected by default passwords, with no clear sign to the owner of what happened or why.

See also this related blog post inspired by this article.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by MostCynical on Tuesday April 11 2017, @03:42AM (1 child)

    by MostCynical (2589) on Tuesday April 11 2017, @03:42AM (#492116) Journal

    The hard part will then be *finding* the rigt company to sue.
    Shelf company one manages shelf company two, parts manufactured under comtract at company three, all registered in different countries (if registered at all)
    And the devices are packed, shipped, and sold by three or more additional companies.
    Sue who?

    --
    "I guess once you start doubting, there's no end to it." -Batou, Ghost in the Shell: Stand Alone Complex
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by kaszz on Tuesday April 11 2017, @04:23AM

    by kaszz (4211) on Tuesday April 11 2017, @04:23AM (#492126) Journal

    It's enough to target the company that puts the product on the market. It will make it disappear. Of course another one can sell it but then they also gets taken out. Eventually the cost piles up.