It trashes the storage of the device, drops firewall rules, removes network configuration, and finally halts the device completely.
The effect is such that a user could easily think that the device has dropped dead, potentially due to a hardware failure.
Unix-like systems being targeted
"It's targeting any Unix-like system with default login credentials," Cashdollar told ZDNet. "The binary I captured targets ARM devices. I noticed it also had a Bash shell version available to download which would target any architecture running a Unix like OS."
The attack could intensify very soon
The IP address used for this attack is operated out of Iran and has been added on URLhaus blacklist.
However, don't expect the attack to slow down as the 14-year-old author of the malware, Light Leafon, plans to make it even more destructive.
When contacted anonymously, Light claimed the project started as a joke but will be developed with more destructive functions.
Malware has BrickerBot-like capabilities, claimed Light
"It will be reworked to have the original BrickerBot functionality," Light said without revealing the reason behind his actions. To note, BrickerBot was a malware that worked in the same way and compromised more than ten million IoT devices between April and December 2017.