Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Cybersecurity Lessons from the Brickerbot Outbreak
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Privacy > Cybersecurity Lessons from the Brickerbot Outbreak
ExclusiveITNewsPrivacy

Cybersecurity Lessons from the Brickerbot Outbreak

Annie Qureshi
Annie Qureshi
5 Min Read
Image
SHARE

The Brickerbot virus took the world by storm last week. It was one of the most devastating forms of malware to date.

Contents
  • IoT Devices Aren’t Immune from Cyberattacks
  • Malware Can Permanently Destroy Devices it Infects
  • Unsecured Devices Attract Hackers
  • What Can You to Protect Yourself Against Future Cyberattacks?

There are many unique things about the Brickerbot virus. The thing that stood out the most is that Brickerbot specifically targeted Internet of Things (IoT) devices.

According to the author of Brickerbot, his malware affected over two million devices around the world. Here are some important lessons that both cybersecurity professionals and laypeople can learn from this new outbreak.

IoT Devices Aren’t Immune from Cyberattacks

Most people are very cautious about downloading unknown documents or clicking links from suspicious sources in their emails. However, few people pay any attention to the security of their IoT devices.

More Read

rdp or vpn for cloud businesses
Should Cloud-Based Businesses Use RDPs or VPNs for Remote Access?
5 Amazing Ways to Use Data Analytics to Become A Profitable Trader
Privacy Policy: 3 Things to Consider Before You Click ‘I Accept’
BI: 5 Tips to Remember When Training New Hires Virtually
Big Data Proliferates The Online Gaming Industry In A Surprising Way

Most people can’t even consider the possibility that their Alexa, smart locks or other IoT devices could be hacked. However, all of these devices are connected to the Internet, so they are clearly vulnerable to malicious hackers, such as the author of Brickerbot.

Malware Can Permanently Destroy Devices it Infects

Cybercriminals have a number of motives for developing malware. These motives can range from extortion, embarrassing enemies, stealing financial information and shutting down business competitors.

Since these are the most common motives, malware rarely causes significant damage to a device. However, some hackers like the Brickerbot author have more extreme motives. They actually  develop malware to physically destroy devices. According to a report from TechCrunch, many of the devices infected by the Brickerbot were permanently disabled.

“BrickerBot finds these devices and renders them unusable. The first version attacked about a thousand devices and alternate versions attacked thousands more. It disabled the devices by formatting the internal memory.”

Unsecured Devices Attract Hackers

The Brickerbot author had a unique agenda. According to his online confession, he is a vigilante that developed malware to disable insecure devices to keep them from infecting other parts of the Internet.

“I hope that regulatory bodies will do more to penalize careless manufacturers since market forces can’t fix this problem. The reality of the market is that technically unskilled consumers will get the cheapest whitelabel DVR they can find at their local store, then they’ll ask their nephew to plug it into the Internet, and a few minutes later it’ll be full of malware. At least with ‘BrickerBot’ there was some brief hope that such dangerous devices could become the merchant’s and manufacturer’s problem rather than our problem.”

His malware deliberately sought out insecure devices to remove them from the Internet. Most other hackers target insecure devices for a simpler and less noble reason – they are easier targets.

Regardless of the motive, it’s clear that insecure devices attract hackers like blood draws sharks. People that don’t keep their devices secure are more vulnerable on multiple fronts.

What Can You to Protect Yourself Against Future Cyberattacks?

One thing is clear – cybercriminals aren’t pulling the brakes on their attacks anytime soon. The Brickerbot attack was one of the most destructive in memory.

Since cyberattacks are occurring at a greater frequency, it is important for people to take all necessary precautions to keep all of their devices safe, including their IoT devices. These precautions include using VPN services at VPNAnalysis.com to encrypt their data. It is important to read a guide before using a VPN, because you may not be protecting your data if it isn’t set up properly.

It is also important to set strong passwords and two-token authentication settings to minimize the risk of exploitation.

Finally, if your device is attacked, you may need to take urgent steps to reverse the damage. Cybersecurity experts told victims of the Brickerbot attack that they may need to reset their factory settings to undo the damage. Otherwise, their device may be rendered permanently useless.

While the increased prevalence of cyberattacks is worrisome, there are always ways for people to guard themselves against it.

TAGGED:cybersecurity
Share This Article
Facebook Pinterest LinkedIn
Share
ByAnnie Qureshi
Follow:
Annie is a passionate writer and serial entrepreneur. She embraces ecommerce opportunities that go beyond profit, giving back to non-profits with a portion of the revenue she generates. She is significantly more productive when she has a cause that reaches beyond her pocketbook.

Follow us on Facebook

Latest News

street address database
Why Data-Driven Companies Rely on Accurate Street Address Databases
Big Data Exclusive
predictive analytics risk management
How Predictive Analytics Is Redefining Risk Management Across Industries
Analytics Exclusive Predictive Analytics
data analytics and gold trading
Data Analytics and the New Era of Gold Trading
Analytics Big Data Exclusive
student learning AI
Advanced Degrees Still Matter in an AI-Driven Job Market
Artificial Intelligence Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

blockchain security problems
BlockchainExclusiveSecurity

Is Blockchain The Answer To Blockchain Security Problems?

7 Min Read

Dronegate: The First Casualty is Our Cybersecurity Paradigm

6 Min Read
email threat landscape
AnalyticsExclusiveITPredictive AnalyticsSecurity

Role Of Predictive Analytics In The Shifting Email Threat Landscape

8 Min Read
apple face recognition in the age of big data
Big DataExclusive

Wiping An iPhone With And Without An Apple ID In The Age of Big Data

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?