It looks like the DS trojan bricker is in the wild. There are instructions up to fix the situation. I was contacted by DarkFader last week wondering if I’d be interested in his answer to the PSP’s malware that had been circulating. I’m not interested in this kind of hacking because I feel it takes a lot a lot more finesse NOT to break something. Here’s the info straight from the source for those interested:

[witheld] <[witheld]@gmail.com>

Fri, Oct 7, 2005 at 4:46 AM

To: Eliot Phillips <[witheld]@gmail.com>

Currently it tries to:

* erase XG flash card * erase DS firmware   (but recoverable when a patched firmware was installed) * erase CompactFlash card inside GBA movieplayer * erase GBA movieplayer firmware * erase Supercard firmware

a lot more devices to erase will be supported in the future. Of course nobody would want try it if it’s known what it does 🙂 but someone could rename it and add a different text file to make it a lot more attractive to run. Not lots of people can run this program anyway. It’s not as easy as on PSP considering that it requires a PassMe device.

On 10/7/05, Eliot Phillips <[witheld]@gmail.com> wrote: > It does what? You’re going to have to spell it out for me. > > Eliot Phillips > Hack-A-Day > > On 10/7/05, HACK ideas <[witheld]@weblogsinc.com> wrote: > > > >         IP: [witheld] > >         Name: anonymous > >         Email: [witheld]@gmail.com > >         URL: > >         Subject: nintendo ds malware > >         HACK Site: http://www.hackaday.com/ > > > > Nintendo DS r0m loader (Risky-zero-Memory loader / bricking utility) > > URL: > > http://s52.yousendit.com/d.aspx?id=2L8PULZJOAPC81ON3J27LRY0M2 > > or http://www.sendspace.com/file/4nj8lj > > This was written in action to the PSP variant. > > maybe you can name both. > > Not sure if it’s a good ‘hack’ though. > > > >         related URL: > > > > >