Connect with us

News

Mirai Botnet Evolves Again, Targeting Unpatched TBK DVRs With New Exploit

Published

on

<p data-start&equals;"327" data-end&equals;"602">A fresh variant of the Mirai malware is on the loose&comma; and it&&num;8217&semi;s already hijacking thousands of digital video recorders through an exploit that&&num;8217&semi;s been publicly known for weeks&period; The devices are falling fast&comma; and the consequences could ripple far beyond what’s visible right now&period;<&sol;p>&NewLine;<p data-start&equals;"604" data-end&equals;"893">Security experts are sounding the alarm after seeing a surge in infections linked to CVE-2024-3721—a command injection flaw affecting TBK DVR-4104 and DVR-4216 models&period; And here&&num;8217&semi;s the kicker&colon; many of these units are rebranded and spread globally under names people might not even recognize&period;<&sol;p>&NewLine;<h2 data-start&equals;"895" data-end&equals;"937">Exploit Went Public&comma; Hackers Moved Fast<&sol;h2>&NewLine;<p data-start&equals;"939" data-end&equals;"1269">This all started back in April 2024&comma; when a researcher going by the handle &&num;8220&semi;netsecfish&&num;8221&semi; publicly disclosed the CVE-2024-3721 vulnerability&period; The flaw lets attackers send specially crafted POST requests to certain endpoints&comma; tricking the devices into running shell commands by fiddling with two specific parameters&colon; <code data-start&equals;"1253" data-end&equals;"1258">mdb<&sol;code> and <code data-start&equals;"1263" data-end&equals;"1268">mdc<&sol;code>&period;<&sol;p>&NewLine;<p data-start&equals;"1271" data-end&equals;"1415">At the time&comma; the proof-of-concept code seemed technical and low-risk for most people&period; But within weeks&comma; malware authors turned it into a weapon&period;<&sol;p>&NewLine;<p data-start&equals;"1417" data-end&equals;"1625">Now&comma; Kaspersky reports their honeypots are capturing live exploitation attempts&period; The attackers are pushing a Mirai botnet variant onto vulnerable devices—mostly Linux-based DVRs running on ARM32 architecture&period;<&sol;p>&NewLine;<p data-start&equals;"1417" data-end&equals;"1625"><a href&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;06&sol;tbk-vision-dvr-malware-botnet-infection-2024&period;jpg"><img class&equals;"aligncenter size-full wp-image-57633" src&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;06&sol;tbk-vision-dvr-malware-botnet-infection-2024&period;jpg" alt&equals;"tbk vision dvr malware botnet infection 2024" width&equals;"1462" height&equals;"824" &sol;><&sol;a><&sol;p>&NewLine;<h2 data-start&equals;"1627" data-end&equals;"1671">What Happens Once the Device Is Infected&quest;<&sol;h2>&NewLine;<p data-start&equals;"1673" data-end&equals;"1822">Once the malware lands on the DVR&comma; it quickly connects to its command-and-control &lpar;C2&rpar; server&period; From there&comma; the infected device doesn’t just sit idle&period;<&sol;p>&NewLine;<p data-start&equals;"1824" data-end&equals;"2113">It becomes part of a broader botnet army&comma; ready to launch Distributed Denial-of-Service &lpar;DDoS&rpar; attacks&comma; act as a relay for malicious traffic&comma; or even participate in other cybercrimes&period; These devices&comma; usually sitting unnoticed in server rooms or closets&comma; become digital mercenaries for hire&period;<&sol;p>&NewLine;<p data-start&equals;"2115" data-end&equals;"2186">And let’s be honest—no one checks their DVR firmware updates regularly&period;<&sol;p>&NewLine;<h2 data-start&equals;"2188" data-end&equals;"2225">Exposure Numbers Aren’t Reassuring<&sol;h2>&NewLine;<p data-start&equals;"2227" data-end&equals;"2387">According to netsecfish&&num;8217&semi;s initial estimate&comma; around 114&comma;000 of these DVRs were exposed online back in 2023&period; That number might have dipped since&comma; but not by much&period;<&sol;p>&NewLine;<p data-start&equals;"2389" data-end&equals;"2607">Kaspersky’s latest scans suggest 50&comma;000 devices are still wide open&period; That’s not a small number&comma; especially when each of those machines can play a role in crippling online infrastructure through coordinated attacks&period;<&sol;p>&NewLine;<p data-start&equals;"2609" data-end&equals;"2893">• Infections seem concentrated in countries like China&comma; India&comma; Egypt&comma; Ukraine&comma; Russia&comma; Turkey&comma; and Brazil&period;<br data-start&equals;"2715" data-end&equals;"2718" &sol;>• But this is based solely on Kaspersky’s telemetry—so&comma; not a full picture&period;<br data-start&equals;"2793" data-end&equals;"2796" &sol;>• Plus&comma; since Kaspersky software is restricted in many regions&comma; the real spread could be broader&period;<&sol;p>&NewLine;<h2 data-start&equals;"2984" data-end&equals;"3025">The Update Dilemma and Brand Confusion<&sol;h2>&NewLine;<p data-start&equals;"3027" data-end&equals;"3185">Here&&num;8217&semi;s where things get murky&period; The affected DVR-4104 and DVR-4216 devices aren&&num;8217&semi;t just sold under the TBK Vision label&period; They&&num;8217&semi;ve been rebranded dozens of times&period;<&sol;p>&NewLine;<p data-start&equals;"3187" data-end&equals;"3359">Users might have bought them thinking they were getting something from brands like Novo&comma; CeNova&comma; QSee&comma; Pulnix&comma; XVR 5 in 1&comma; Securus&comma; or Night OWL&period; That’s just to name a few&period;<&sol;p>&NewLine;<p data-start&equals;"3361" data-end&equals;"3596">Trying to figure out whether a patch exists—or if the vendor even still supports the model—is often a dead end&period; TBK Vision hasn’t publicly confirmed if updates are out&period; BleepingComputer reached out&comma; but there&&num;8217&semi;s still no word from them&period;<&sol;p>&NewLine;<p data-start&equals;"3598" data-end&equals;"3624">So&comma; what are we left with&quest;<&sol;p>&NewLine;<div class&equals;"&lowbar;tableContainer&lowbar;16hzy&lowbar;1">&NewLine;<div class&equals;"&lowbar;tableWrapper&lowbar;16hzy&lowbar;14 group flex w-fit flex-col-reverse" tabindex&equals;"-1">&NewLine;<table class&equals;"w-fit min-w-&lpar;--thread-content-width&rpar;" data-start&equals;"3626" data-end&equals;"4178">&NewLine;<thead data-start&equals;"3626" data-end&equals;"3704">&NewLine;<tr data-start&equals;"3626" data-end&equals;"3704">&NewLine;<th data-start&equals;"3626" data-end&equals;"3648" data-col-size&equals;"sm">DVR Brand Alias<&sol;th>&NewLine;<th data-start&equals;"3648" data-end&equals;"3671" data-col-size&equals;"sm">Based on TBK Models&quest;<&sol;th>&NewLine;<th data-start&equals;"3671" data-end&equals;"3704" data-col-size&equals;"sm">Patch Availability Confirmed&quest;<&sol;th>&NewLine;<&sol;tr>&NewLine;<&sol;thead>&NewLine;<tbody data-start&equals;"3784" data-end&equals;"4178">&NewLine;<tr data-start&equals;"3784" data-end&equals;"3862">&NewLine;<td data-start&equals;"3784" data-end&equals;"3806" data-col-size&equals;"sm">CeNova<&sol;td>&NewLine;<td data-start&equals;"3806" data-end&equals;"3829" data-col-size&equals;"sm">Yes<&sol;td>&NewLine;<td data-start&equals;"3829" data-end&equals;"3862" data-col-size&equals;"sm">Unknown<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"3863" data-end&equals;"3941">&NewLine;<td data-start&equals;"3863" data-end&equals;"3885" data-col-size&equals;"sm">QSee<&sol;td>&NewLine;<td data-start&equals;"3885" data-end&equals;"3908" data-col-size&equals;"sm">Yes<&sol;td>&NewLine;<td data-start&equals;"3908" data-end&equals;"3941" data-col-size&equals;"sm">Unknown<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"3942" data-end&equals;"4020">&NewLine;<td data-start&equals;"3942" data-end&equals;"3964" data-col-size&equals;"sm">Night OWL<&sol;td>&NewLine;<td data-start&equals;"3964" data-end&equals;"3987" data-col-size&equals;"sm">Yes<&sol;td>&NewLine;<td data-start&equals;"3987" data-end&equals;"4020" data-col-size&equals;"sm">Unconfirmed<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4021" data-end&equals;"4099">&NewLine;<td data-start&equals;"4021" data-end&equals;"4043" data-col-size&equals;"sm">Pulnix<&sol;td>&NewLine;<td data-start&equals;"4043" data-end&equals;"4066" data-col-size&equals;"sm">Yes<&sol;td>&NewLine;<td data-start&equals;"4066" data-end&equals;"4099" data-col-size&equals;"sm">Unknown<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4100" data-end&equals;"4178">&NewLine;<td data-start&equals;"4100" data-end&equals;"4122" data-col-size&equals;"sm">Securus<&sol;td>&NewLine;<td data-start&equals;"4122" data-end&equals;"4145" data-col-size&equals;"sm">Yes<&sol;td>&NewLine;<td data-start&equals;"4145" data-end&equals;"4178" data-col-size&equals;"sm">No official comment<&sol;td>&NewLine;<&sol;tr>&NewLine;<&sol;tbody>&NewLine;<&sol;table>&NewLine;<div class&equals;"sticky end-&lpar;--thread-content-margin&rpar; h-0 self-end select-none">&NewLine;<div><&sol;div>&NewLine;<div class&equals;"absolute end-0 flex items-end">This leaves thousands of consumers and small businesses hanging with potentially compromised devices&period;<&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<h2 data-start&equals;"4283" data-end&equals;"4329">Researchers Say This Isn’t an Isolated Case<&sol;h2>&NewLine;<p data-start&equals;"4331" data-end&equals;"4604">Netsecfish hasn’t been quiet this year&period; The same researcher previously uncovered backdoor accounts and command injection bugs affecting thousands of end-of-life &lpar;EoL&rpar; D-Link routers&period; Those flaws&comma; too&comma; were scooped up by attackers almost immediately after public disclosure&period;<&sol;p>&NewLine;<p data-start&equals;"4606" data-end&equals;"4791">There’s a pattern here—malware authors are watching GitHub and security blogs like hawks&period; The window between a vulnerability disclosure and active exploitation has practically vanished&period;<&sol;p>&NewLine;<p data-start&equals;"4875" data-end&equals;"5092">The Mirai variant currently in use is performing the usual environment checks before deploying itself—avoiding sandboxes&comma; seeking persistence&comma; and ensuring its architecture matches&period; Nothing fancy&comma; but still effective&period;<&sol;p>&NewLine;<h2 data-start&equals;"5094" data-end&equals;"5147">No Clear Path to Protection&comma; But One Harsh Reality<&sol;h2>&NewLine;<p data-start&equals;"5149" data-end&equals;"5325">The sad part&quest; Most people who own these DVRs probably won’t ever know they’re vulnerable&period; They’re low-maintenance devices&comma; and unless something breaks&comma; no one logs in to check&period;<&sol;p>&NewLine;<p data-start&equals;"5327" data-end&equals;"5471">Meanwhile&comma; attackers keep expanding their control&period; The botnet doesn’t need thousands of new nodes every day—just enough to keep attacks rolling&period;<&sol;p>&NewLine;<p data-start&equals;"5473" data-end&equals;"5616">Even more concerning&colon; the DDoS-for-hire market thrives on this kind of silent compromise&period; For a few bucks&comma; anyone can rent a part of the swarm&period;<&sol;p>&NewLine;

Stephon Brody is a writer who is good at movies, sports, technology, and health related articles. He is passionate about sharing his knowledge and opinions on various topics that interest him and his audience. He is a creative and reliable writer who can deliver engaging and informative articles to his readers.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING