{"id":436,"date":"2018-07-04T12:47:40","date_gmt":"2018-07-04T12:47:40","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/?post_type=chapter&#038;p=436"},"modified":"2018-07-04T12:56:34","modified_gmt":"2018-07-04T12:56:34","slug":"brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/chapter\/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices\/","title":{"raw":"BrickerBot is a vigilante worm that destroys insecure IoT devices","rendered":"BrickerBot is a vigilante worm that destroys insecure IoT devices"},"content":{"raw":"<a href=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04125450\/brickerbot3-fig-5.png\"><img class=\"aligncenter size-full wp-image-441\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04125450\/brickerbot3-fig-5.png\" alt=\"\" width=\"799\" height=\"362\" \/><\/a>\r\n\r\nA hacker called\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/brickerbot-author-claims-he-bricked-two-million-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Janitor<\/a>\u00a0has created multiple versions of a program called BrickerBot, a system that searches out and bricks insecure IoT devices. A researcher named Pascal Geenens has followed the worm for a few weeks and has seen it pop up and essentially destroy infected webcams and other IoT devices.\r\n\r\nThe devices all used a Linux package called BusyBox and had exposed telnet-based interfaces with default passwords. These devices were easily exploited by the Mirai botnet, which essentially turned them into denial-of-service weapons.\r\n\r\n<a href=\"https:\/\/security.radware.com\/ddos-threats-attacks\/brickerbot-pdos-back-with-vengeance\/\" target=\"_blank\" rel=\"noopener noreferrer\">BrickerBot<\/a>\u00a0finds these devices and renders them unusable. The first version attacked about a thousand devices and alternate versions attacked thousands more. It disabled the devices by formatting the internal memory.\r\n\r\n\u201cLike so many others I was dismayed by the indiscriminate DDoS attacks by IoT botnets in 2016. I thought for sure that the large attacks would force the industry to finally get its act together, but after a few months of record-breaking attacks it became obvious that in spite of all the sincere efforts the problem couldn\u2019t be solved quickly enough by conventional means,\u201d wrote the Janitor. \u201cI consider my project a form of \u2018Internet Chemotherapy;\u2019 I sometimes jokingly think of myself as The Doctor. Chemotherapy is a harsh treatment that nobody in their right mind would administer to a healthy patient, but the Internet was becoming seriously ill in Q3 and Q4\/2016 and the moderate remedies were ineffective.\u201d\r\n\r\nThis sort of vigilante justice is fun and clever. If a user can\u2019t secure their own systems, perhaps a bit of discriminate destruction is just what these things need to stop leaving admin passwords wide open.","rendered":"<p><a href=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04125450\/brickerbot3-fig-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-441\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04125450\/brickerbot3-fig-5.png\" alt=\"\" width=\"799\" height=\"362\" \/><\/a><\/p>\n<p>A hacker called\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/brickerbot-author-claims-he-bricked-two-million-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Janitor<\/a>\u00a0has created multiple versions of a program called BrickerBot, a system that searches out and bricks insecure IoT devices. A researcher named Pascal Geenens has followed the worm for a few weeks and has seen it pop up and essentially destroy infected webcams and other IoT devices.<\/p>\n<p>The devices all used a Linux package called BusyBox and had exposed telnet-based interfaces with default passwords. These devices were easily exploited by the Mirai botnet, which essentially turned them into denial-of-service weapons.<\/p>\n<p><a href=\"https:\/\/security.radware.com\/ddos-threats-attacks\/brickerbot-pdos-back-with-vengeance\/\" target=\"_blank\" rel=\"noopener noreferrer\">BrickerBot<\/a>\u00a0finds these devices and renders them unusable. The first version attacked about a thousand devices and alternate versions attacked thousands more. It disabled the devices by formatting the internal memory.<\/p>\n<p>\u201cLike so many others I was dismayed by the indiscriminate DDoS attacks by IoT botnets in 2016. I thought for sure that the large attacks would force the industry to finally get its act together, but after a few months of record-breaking attacks it became obvious that in spite of all the sincere efforts the problem couldn\u2019t be solved quickly enough by conventional means,\u201d wrote the Janitor. \u201cI consider my project a form of \u2018Internet Chemotherapy;\u2019 I sometimes jokingly think of myself as The Doctor. Chemotherapy is a harsh treatment that nobody in their right mind would administer to a healthy patient, but the Internet was becoming seriously ill in Q3 and Q4\/2016 and the moderate remedies were ineffective.\u201d<\/p>\n<p>This sort of vigilante justice is fun and clever. If a user can\u2019t secure their own systems, perhaps a bit of discriminate destruction is just what these things need to stop leaving admin passwords wide open.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-436\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Specific attribution<\/div><ul class=\"citation-list\"><li> BrickerBot is a vigilante worm that destroys insecure IoT devices. <strong>Authored by<\/strong>: John Biggs. <strong>Provided by<\/strong>: Tech Crunch. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/techcrunch.com\/2017\/04\/25\/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices\/\">https:\/\/techcrunch.com\/2017\/04\/25\/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":15008,"menu_order":14,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc-attribution\",\"description\":\" BrickerBot is a vigilante worm that destroys insecure IoT devices\",\"author\":\"John Biggs\",\"organization\":\"Tech Crunch\",\"url\":\"https:\/\/techcrunch.com\/2017\/04\/25\/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices\/\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-436","chapter","type-chapter","status-publish","hentry"],"part":406,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/users\/15008"}],"version-history":[{"count":3,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/436\/revisions"}],"predecessor-version":[{"id":445,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/436\/revisions\/445"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/parts\/406"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/436\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/media?parent=436"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapter-type?post=436"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/contributor?post=436"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/license?post=436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}