April 27, 2017 By Larry Loeb 2 min read

Sierra Tel (ST) won’t forget April 10. On that date this year, the California-based telecommunications company may have been taken down by two warring families of botnets that attacked an Internet of Things (IoT) device in its network.

An IoT Device With a Checkered History

When its customers in Mariposa and Oakhurst, California, started to complain that they had lost all connectivity, the company determined that all these customers were using the same modem, the ZyXel HN51.

While ST diagnosed the cause of the problem rather quickly, Bleeping Computer reported that it took until April 22 for all the affected customers to obtain replacement devices. Frustrated customers quickly exhausted available supplies of the modem when the company offered them an opportunity to swap out old devices at its offices.

The ZyXel HN51 has a checkered history. This is the same modem that caused Deutsche Telekom to go offline for nearly a full day last year, according to Bleeping Computer. It took the German ISP about that long to regain control over its devices through a firmware update. A week later, some British ISPs experienced the same problem. At the time, the Mirai IoT botnet was thought to be the culprit.

The ZyXel modem uses the TR-069 control interface as a way for system administrators to assert hardware-level control on modems in a network. But that interface can be exploited, according to SANS, requiring strict filtering at the network or modem interface to prevent the exploits from occurring.

Vigilante Justice

It’s possible that a vigilante IoT construct could have caused this failure while trying to neutralize rogue IoT devices. One such construct, BrickerBot, is said to be able to wipe any onboard memory in a device and rewrite it with random garbage, Bleeping Computer reported. That would require device replacement, which is just what ST was forced to do.

A clear solution is nowhere in sight. Other unknown threat actors may be at work here as well, and this particular modem has proven to be exploitable. But a system operator such as ST must be aware of the actions that need to be implemented by a network to avoid bricked devices. No matter how or why they get bricked, they’ll almost always come with irate customers attached.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today