Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics in ecommerce
    Analytics Technology Drives Conversions for Your eCommerce Site
    5 Min Read
    CRM Analytics
    CRM Analytics Helps Content Creators Develop an Edge in a Saturated Market
    5 Min Read
    data analytics and commerce media
    Leveraging Commerce Media & Data Analytics in Ecommerce
    8 Min Read
    big data in healthcare
    Leveraging Big Data and Analytics to Enhance Patient-Centered Care
    5 Min Read
    instagram visibility
    Data Analytics Plays a Key Role in Improving Instagram Visibility
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Cybersecurity Lessons from the Brickerbot Outbreak
Share
Notification Show More
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Privacy > Cybersecurity Lessons from the Brickerbot Outbreak
ExclusiveITNewsPrivacy

Cybersecurity Lessons from the Brickerbot Outbreak

Annie Qureshi
Last updated: May 20, 2017 8:52 pm
Annie Qureshi
5 Min Read
Image
SHARE

The Brickerbot virus took the world by storm last week. It was one of the most devastating forms of malware to date.

Contents
IoT Devices Aren’t Immune from CyberattacksMalware Can Permanently Destroy Devices it InfectsUnsecured Devices Attract HackersWhat Can You to Protect Yourself Against Future Cyberattacks?

There are many unique things about the Brickerbot virus. The thing that stood out the most is that Brickerbot specifically targeted Internet of Things (IoT) devices.

According to the author of Brickerbot, his malware affected over two million devices around the world. Here are some important lessons that both cybersecurity professionals and laypeople can learn from this new outbreak.

IoT Devices Aren’t Immune from Cyberattacks

Most people are very cautious about downloading unknown documents or clicking links from suspicious sources in their emails. However, few people pay any attention to the security of their IoT devices.

More Read

machine learning and web hosting

The Fascinating Benefits of Machine Learning for Web Hosting Monetization

5 Urgent Changes to Immediately Improve Business Data Security
Testing New AI Applications is Crucial Before Bringing them to Market
Cindy Weng Named Community Digital Strategist
What does Whale Vomit have in Common with Big Data and Analytics?

Most people can’t even consider the possibility that their Alexa, smart locks or other IoT devices could be hacked. However, all of these devices are connected to the Internet, so they are clearly vulnerable to malicious hackers, such as the author of Brickerbot.

Malware Can Permanently Destroy Devices it Infects

Cybercriminals have a number of motives for developing malware. These motives can range from extortion, embarrassing enemies, stealing financial information and shutting down business competitors.

Since these are the most common motives, malware rarely causes significant damage to a device. However, some hackers like the Brickerbot author have more extreme motives. They actually  develop malware to physically destroy devices. According to a report from TechCrunch, many of the devices infected by the Brickerbot were permanently disabled.

“BrickerBot finds these devices and renders them unusable. The first version attacked about a thousand devices and alternate versions attacked thousands more. It disabled the devices by formatting the internal memory.”

Unsecured Devices Attract Hackers

The Brickerbot author had a unique agenda. According to his online confession, he is a vigilante that developed malware to disable insecure devices to keep them from infecting other parts of the Internet.

“I hope that regulatory bodies will do more to penalize careless manufacturers since market forces can’t fix this problem. The reality of the market is that technically unskilled consumers will get the cheapest whitelabel DVR they can find at their local store, then they’ll ask their nephew to plug it into the Internet, and a few minutes later it’ll be full of malware. At least with ‘BrickerBot’ there was some brief hope that such dangerous devices could become the merchant’s and manufacturer’s problem rather than our problem.”

His malware deliberately sought out insecure devices to remove them from the Internet. Most other hackers target insecure devices for a simpler and less noble reason – they are easier targets.

Regardless of the motive, it’s clear that insecure devices attract hackers like blood draws sharks. People that don’t keep their devices secure are more vulnerable on multiple fronts.

What Can You to Protect Yourself Against Future Cyberattacks?

One thing is clear – cybercriminals aren’t pulling the brakes on their attacks anytime soon. The Brickerbot attack was one of the most destructive in memory.

Since cyberattacks are occurring at a greater frequency, it is important for people to take all necessary precautions to keep all of their devices safe, including their IoT devices. These precautions include using VPN services at VPNAnalysis.com to encrypt their data. It is important to read a guide before using a VPN, because you may not be protecting your data if it isn’t set up properly.

It is also important to set strong passwords and two-token authentication settings to minimize the risk of exploitation.

Finally, if your device is attacked, you may need to take urgent steps to reverse the damage. Cybersecurity experts told victims of the Brickerbot attack that they may need to reset their factory settings to undo the damage. Otherwise, their device may be rendered permanently useless.

While the increased prevalence of cyberattacks is worrisome, there are always ways for people to guard themselves against it.

TAGGED:cybersecurity
Share This Article
Facebook Twitter Pinterest LinkedIn
Share
By Annie Qureshi
Follow:
Annie is a passionate writer and serial entrepreneur. She embraces ecommerce opportunities that go beyond profit, giving back to non-profits with a portion of the revenue she generates. She is significantly more productive when she has a cause that reaches beyond her pocketbook.

Follow us on Facebook

Latest News

trusted data management
The Future of Trusted Data Management: Striking a Balance between AI and Human Collaboration
Artificial Intelligence Big Data Data Management
data analytics in ecommerce
Analytics Technology Drives Conversions for Your eCommerce Site
Analytics Exclusive
data grids in big data apps
Best Practices for Integrating Data Grids into Data-Intensive Apps
Big Data Exclusive
AI helps create discord server bots
AI-Driven Discord Bots Can Track Server Stats
Artificial Intelligence Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

cybersecurity simulations
Artificial IntelligenceExclusiveITSecurity

Combat AI-Powered Threats with Cybersecurity Simulations & Other Practices

7 Min Read
ransomware increase
Data Management

AI-Savvy Hackers Threaten Businesses With 20% Ransomware Increase

6 Min Read
cyber security tools
Security

Why Companies Should Leverage these Cybersecurity Tools?

8 Min Read
managed cloud hosting
Cloud ComputingExclusiveITSecurity

Delivering Security And Operational Efficiency In Multi-Cloud Environments

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-24 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?