In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-25 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
To access the device through Telnet, default username / password: root/vizxv
Radware further details a series of actions after the malicious program successfully accesses the device, and after gaining permissions:
PDoS immediately executes a series of Linux commands that corrupt storage
The third is the command to destroy device performance, network connection, and erase all files on the device.
According to Radware's researchers, the BrickerBot*** targets it captured from the honeypot were Linux/BusyBox IOT devices, which opened Telnet ports and were exposed to the public network, similar to the Mirai last October.
Summary of the main points of the original article
Similar to Mirai
PDoS/Phlashing: permanent denial of service, which can damage firmware. The only solution is to replace or reinstall the firmware.
Within four days, Radware's honeypot recorded 1895 PDoS*** from around the world.
The difference between two paths (Internet/TOR,BrickerBot.1/BrickerBot.2) is about one hour. BrickerBot.2 executes PDoS
Log in to Telnet by brute force cracking. The complete dictionary cannot be obtained without a sample. Only the first attempt username / password was recorded: root/vizxv
BrickerBot.1 executes corrupt commands: corrupt storage, damage network connectivity, device performance, and erase all files on the device
Special devices / dev/mtd and / dev/mmc for
/ dev/mtd:Memory Technology Device-a special device type to match flash characteristics
/ dev/mmc:MultiMediaCard-a special device type that matches memory card standard, a solid-state storage medium
Reconfigure kernel parameters: timestamp of TCP, maximum number of threads in the kernel
For Linux/BusyBox-based Internet of things devices that open Telnet ports on the network
Port 22 and devices running older versions of the DropbearSSH service, and these devices are recognized by Shodan as Ubiquiti
For BrickerBot.2, 333 PDoS with different commands were recorded at the same time. Unable to locate the * source and is currently continuing. The first login command: root/root,root/vizxv, followed by the following commands:
BrickerBot.2 is more thorough and targeted than BrickerBot.1 's commands, and does not rely on busybox
Threaten
The final command is the same as the PDoS*** described earlier, and attempts to delete the default gateway, erase the device through rm-rf / *, disable the TCP timestamp, and limit the maximum number of kernel threads to one. This time, similar to the storage corruption command, additional commands have been added to refresh all iptables firewall and NAT rules, and a rule has been added to remove all outgoing packets.
BrickerBot.1 has stopped and BrickerBot.2 is continuing.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
Www.virustotal.comFree Online Virus, Malware and URL Scanner
© 2024 shulou.com SLNews company. All rights reserved.