Last week, Radware highlighted a new form of malware called BrickerBot that corrupts a device’s storage capability and reconfiguring kernel parameters. Cesare Garlati, Chief Security Strategist at prpl foundation commented below.
Cesare Garlati, Chief Security Strategist at prpl foundation:
“This is another case where – if properly implemented – security through separation using the prplSecurity framework could isolate core device functionality from these types of malicious attacks. In a nutshell: the Linux software exposed to Internet attack (telnet/busybox) would have no access whatsoever to the prplHypervisor resources responsible for remote patch and updates – i.e. it would make the device “un-brickable” from the Internet side.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.