The attacks are only expected to increase in the coming days as they are still ongoing.
Its using known default credentials for IoT devices to get in and kill the system.
Its doing this by writing random data from/dev/randomto any mounted storage it finds.
I see in the binary its callingfdisk -lwhich will list all disk partitions.
It then writes random data from/dev/randomto any partitions it discovers.
It also flushes all iptables entries adding one that DROPS all connections.
Then halting or rebooting the equipment, Cashdollar said.
Its targeting any Unix-like system with default login credentials.
The binary I captured targets ARM devices.
Also read-The Best Programming Language For IoT?
Light told Anubhav that the malware reportedly created as a joke developed into a full-time project for them.
It will be reworked to have the original BrickerBot functionality, Light told Anubhav and ZDNet.
My friend Skiddy and I are going to rework the whole bot.
It is going to target every single publicly known exploit that Mirai or Qbot load.
I will keep coding and doing that but not go further in the IoT community, he said.
source: www.techworm.net