IoT Gadget Bricking New Silex

Posted on the 02 February 2023 by Umargeeks

We will learn today, about IoT gadget Bricking New Silex. We will discuss and understand the topic in detail. In just a few hours, more than 2,000 smartphones had bricked. Attacks continue to occur.

In assaults reminiscent of the previous BrickerBot malware that damaged millions of devices in 2017. Anew strain of malware is erasing the firmware of Internet of Things devices. This virus, calls Silex, started functioning earlier today, around three to four hours prior to it.

When this reporter started looking into the malware’s operations. It had bricked about 350 devices. However, the figure swiftly increased to 2,000 wiped devices.

read more: IoT Recognition between Singapore and Germany

Attacks are still going on, and, according to an interview with the person. Who created the software, they’re going to get worse soon. We will learn today, about IoT gadget Bricking New Silex. We will discuss and understand the topic in detail.

How the Silex Virus Operates; IoT gadget Bricking New Silex:

The virus, called Silex, says to operate by eradicating an IoT device’s storage, eliminating firewall rules, erasing the network configuration. And then suspending the device, according to Akamai researcher Larry Cashdollar. Who discovered the malware earlier today.

According to Akamai researcher Larry Cashdollar, who found the malware earlier today, the virus, known as Silex, believe to function eradicating an IoT device’s storage, eliminating firewall rules. Eradicating the network configuration, and then suspending the device.

It’s as damaging as it can without actually frying the circuits of the IoT gadget. Victims must manually reload the device’s firmware in order to recover. Which is a job most device owners find challenging.

It anticipates that some owners would throw away gadgets, believing they have experienced a hardware breakdown. Without realizing they have infected with malware. It logs in and kills the system using well-known default credentials for IoT devices,

Cashdollar said, “I notice in the program it’s calling disk which will show all disc partitions.” Then, it creates random data files in /dev/random and writes them to any partitions it finds.

Then it deletes network settings and executes rm -rf, which will remove whatever it missed. “Additionally, it adds a new entry to IP tables that DROPS all connections. After stopping or restarting the apparatus, “said the researcher.

Attacks Launched From a Server in Iran; IoT gadget Bricking New Silex:

According to Cashdollar, it targets any Unix-like machine with default login credentials. “The binary I intercepted is meant for ARM hardware. I saw that there was a Bash shell version that can downloaded. As well, targeting any architecture using a Unix-like operating system.”

This also implies that Linux systems with open Telnet ports and compromised or commonly used credentials will destroy Silex.

When we enquired about the origin of these assaults, Cashdollar replied, “It looks the IP address that targeted my honeypot is located on a VPS server owned by novinvps.com, which is managed out of Iran.”

After discover IoT malware researcher Rohit Bansal. The IP address has already placed on the URLhaus blacklist as of the time of writing.

The Silex Malware’s Author:

The team contacted the creator of the Silex virus and asked him a number of questions regarding his motivations. And grand strategy with the aid of NewSky Security researcher Ankit Anubhav.

Anubhav claims that a 14-year-old adolescent using the alias Light Leafon online is in charge of this damaging spyware.

In order to prove that we were speaking to the legitimate Silex operator, Anubhav had the hacker post a customised message on the Silex command and control (C&C) server.

Light said that the project originally began as a joke but has since grown into a full-time endeavour, switching from the previous HITO botnet to Silex. The adolescent said that he intended to expand the malware’s damaging capabilities.

Light assured Anubhav that “it would be modified to have the original BrickerBot capabilities.”

Along with the present Telnet hijacking capabilities, plans call for the addition of the ability to log into devices through SSH. Additionally, Light intends to add exploits into Silex, giving the virus the ability to exploit flaws in devices to get access to them. Just like the majority of IoT botnets do today.

Light informed us, “My pal Skiddy and I are planning to completely rewrite the bot.” Every single publicly known exploit that Mirai or Qbot load will target it.

The Legacy of BrickerBot:

The previous BrickerBot strain, which was active between April and December 2017, is unmistakably the source of inspiration for the Silex virus.

Under the alias Janit0r, the creator of BrickerBot claimed to have damaged over 10 million Internet of Things (IoT) devices either permanently or momentarily.

As a sort of protest against the owners of smart gadgets that were at the time often becoming infected with the Mirai DDoS malware, the Janit0r was the one behind the assaults.

The creator of BrickerBot suggested that destroying the devices will preferable to having them remain online for years as DDoS botnet cannon fodder.

Although BrickerBot’s impact could never be properly evaluated, The Janit 0r’s year-long bricking forced several internet service providers to harden their networks against particular attack vectors.

However, unlike the Janit0r, Light has not yet provided any explanation for his conduct. He didn’t issue a manifesto to defend any of his acts as the Janit0r did during the start of BrickerBot attacks. As of right moment, it appears that all of the Silex attacks motivate humor or malice.

However, despite the fact that Light’s acts appear selfish and malevolent, Anubhav referred to the young man as “one of the most well-known and talented IoT threat actors at the present.”

The bad news for Light is that, in contrast to the creator of BrickerBot, who left a negligible amount of footprints that investigators might trace. Light could have made a number of OpSec blunders along the road that could have ultimately cost him. Finally, We learned today, about IoT gadget Bricking New Silex. We discussed and understand the topic in detail.