A new malware strain called BrickerBot is bricking Internet of Things (IoT) devices around the world by corrupting their storage capability and reconfiguring kernel parameters.Detected via honeypot servers maintained by cyber-security firm Radware, the first attacks started on March 20 and continued ever since, targeting only Linux BusyBox-based IoT devices.Right from the get-go, two different versions of BrickerBot were detected: BrickerBot.1 and BrickerBot.2.BrickerBot spreads to devices with open Telnet portsIn the first stages of the attacks, both strains work in a similar way, by attempting a dictionary brute-force attack on devices with Telnet ports left open on the Internet.Just like Mirai, Hajime, LuaBot, and other IoT malware, BrickerBot uses a list of known default credentials used for various IoT devices.
Elon Musks AI skapade fejkade nakenbilder på Taylor Swift – utan att bli tillfrågad
Elon Musks AI-tjänst Grok hamnar åter i centrum för en växande kontrovers kring artificiell intelligens och säkerhet. Enligt rapporter har Grok genererat påhittade nakenbilder på världsstjärnan Taylor Swift – utan att användarna aktivt efterfrågat det. Avslöjandet har lett till kraftig…
0 kommentarer