BrickerBot.1 and BrickerBot.2 The BrickerBot family of malware was first discovered by
Radware on April 20, 2017, when BrickerBot attacked their
honeypot 1,895 times over four days. BrickerBot's method of attack was to brute-force the
telnet password, then run commands using
BusyBox to corrupt
MMC and
MTD storage, delete all files, and disconnect the device from the Internet. Less than an hour after the initial attack, bots began sending a slightly different set of malicious commands, indicating a new version, BrickerBot.2. BrickerBot.2 used the
Tor network to hide its location, did not rely on the presence of busybox on the target, and was able to corrupt more types of storage devices.
BrickerBot.3 and BrickerBot.4 BrickerBot.3 was detected on May 20, 2017, one month after the initial discovery of BrickerBot.1. On the same day, one device was identified as a BrickerBot.4 bot. No other instances of BrickerBot.4 were seen since. == Shutdown and Impact ==