Attackers Exploit DVR Command Injection Flaw to Deploy Mirai Botnet

A new malware campaign exploits a vulnerability in DVRs to deploy a Mirai-based botnet. This affects various architectures and poses significant risks. Enterprises must enhance IoT security to prevent widespread infections.

Malware & RansomwareHIGHUpdated: Published:
Featured image for Attackers Exploit DVR Command Injection Flaw to Deploy Mirai Botnet

Original Reporting

IMInfosecurity Magazine

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, hackers are using a flaw in DVRs to control many devices at once.

What Happened

FortiGuard Labs has reported a new malware campaign exploiting a command injection vulnerability in digital video recorders (DVRs). This attack targets CVE-2024-3721 in TBK DVR systems, allowing attackers to deploy a variant of the Mirai botnet known as Nexcorium. The attackers send crafted requests to exploit vulnerable parameters, leading to the execution of a downloader script that retrieves malicious binaries for various Linux architectures.

How It Works

Once the malware is executed, it takes control of the compromised DVR system. The malware uses a configuration set hidden through XOR encoding, which includes command-and-control (C2) server details and attack instructions. The Nexcorium botnet closely resembles traditional Mirai architecture, featuring modules for scanning, persistence, and attack execution.

Who's Being Targeted

The primary targets are TBK DVR devices, but the malware's design allows it to exploit other devices as well. It utilizes known vulnerabilities, such as CVE-2017-17215, to expand its reach beyond DVRs, affecting routers and other IoT devices. This broad targeting increases the risk of widespread infection across various sectors.

Signs of Infection

Indicators of a Nexcorium infection include:

🔴

Unusual network traffic

Unusual network traffic patterns, especially related to HTTP requests.

🟡

Unexpected changes to

Unexpected changes to system initialization files or scheduled tasks.

🟠

Elevated permissions on

Elevated permissions on devices that should not have them.

How to Protect Yourself

To mitigate the risks associated with this malware:

Detection

  • 1.Ensure all DVR devices are updated with the latest firmware.
  • 2.Disable remote access features unless absolutely necessary.

Removal

  • 3.Implement strong, unique passwords for all IoT devices, avoiding default credentials.
  • 4.Regularly monitor network traffic for unusual activity.

DDoS Capabilities and Operational Impact

After establishing persistence, Nexcorium connects to a remote server to receive commands. It supports various distributed denial-of-service (DDoS) methods, including UDP floods and TCP SYN floods. The malware can dynamically issue attack commands, allowing for coordinated campaigns across infected devices. This centralized control suggests a sophisticated operation capable of significant disruption.

Conclusion

The Nexcorium campaign highlights the ongoing threat posed by IoT vulnerabilities. As enterprises increasingly rely on connected devices, maintaining robust security practices is essential. Failure to address these vulnerabilities can lead to severe operational impacts, including DDoS attacks and unauthorized access to sensitive systems.

🔒 Pro Insight

🔒 Pro insight: The Nexcorium campaign exemplifies the evolving threat landscape of IoT devices, necessitating proactive security measures to mitigate risks.

IMInfosecurity Magazine
Read Original

Related Pings