Another day, another IoT botnet. It's the flavour of the month. But it doesn't look like it will slow down any time soon. After all, the effectiveness of IoT-powered bonnets has been well-established.
But perhaps more worryingly, there is no quick or easy fix in sight. In fact, beyond advising customers to change default credentials, there doesn't seem to be much going into fixing the issue on behalf of the manufacturers.
In this case, the Bricker Bot PDoS attack used Telnet brute force—the same exploit vector used by Mirai—to breach a victim’s devices. Upon successful access to the device, the PDoS bot performed a series of Linux commands that would ultimately lead to corrupted storage, followed by commands to disrupt internet connectivity, device performance and the wiping of all files on the device.