Nexcorium - Tracking a New IoT Botnet Campaign Targeting TBK DVRs

Nexcorium, a new Mirai variant, exploits TBK DVR vulnerabilities and outdated TP-Link routers to execute DDoS attacks, expanding its botnet operations significantly.

Malware & RansomwareHIGHUpdated: Published: πŸ“° 4 sources

Original Reporting

FTFortinet Threat Research

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Nexcorium is like a digital thief that sneaks into smart cameras and old routers to turn them into an army of robots that can flood websites with too much traffic, making them crash. To stop it, we need to fix the holes in these devices and change their passwords.

What Happened

A new variant of the infamous Mirai botnet, named Nexcorium, has emerged, actively targeting TBK DVR devices and outdated TP-Link routers. This campaign exploits a known command injection vulnerability, CVE-2024-3721, allowing attackers to hijack these devices and convert them into a large-scale Distributed Denial-of-Service (DDoS) botnet. The threat actors behind this campaign have been attributed to a group identified as the β€˜Nexus Team,’ although they remain relatively obscure within the cybersecurity landscape.

How It Works

Nexcorium operates by exploiting the CVE-2024-3721 vulnerability, which enables attackers to deliver a downloader script through manipulation of specific request arguments. This script, named β€˜dvr,’ downloads malware samples labeled β€˜nexuscorp’ that are compatible with multiple Linux architectures, including ARM, MIPS, and x86-64. Upon execution, the malware displays a message stating, β€œnexuscorp has taken control.”

The malware architecture mirrors that of traditional Mirai variants, utilizing modular components such as a watchdog, scanner, and attacker module. It performs integrity checks and can replicate itself if alterations are detected, ensuring its persistence on infected devices.

Who's Being Targeted

The primary targets of this campaign are TBK DVR-4104 and DVR-4216 models, as well as end-of-life TP-Link routers. These devices are often left unpatched or lack adequate security measures, making them prime candidates for exploitation.

Signs of Infection

Indicators of infection include unusual network traffic patterns, especially those containing the custom HTTP header β€œX-Hacked-By: Nexus Team – Exploited By Erratic.” Additionally, affected devices may exhibit unexpected behavior, such as unauthorized access attempts or system slowdowns due to DDoS activity.

How to Protect Yourself

Organizations are urged to immediately patch CVE-2024-3721 and replace default manufacturer credentials on all devices. Implementing network segmentation can also help isolate critical infrastructure from vulnerable IoT endpoints. Continuous monitoring for unusual traffic patterns and employing robust intrusion detection systems can further mitigate risks associated with this botnet.

Conclusion

The Nexcorium malware exemplifies the ongoing threat posed by IoT-focused botnets, combining vulnerability exploitation with a sophisticated architecture to maintain long-term access to infected systems. Its use of known exploits, such as CVE-2017-17215 targeting Huawei devices, alongside extensive brute-force capabilities, underscores the need for vigilance in securing IoT devices against such threats.

πŸ”’ Pro Insight

The emergence of Nexcorium highlights the critical need for organizations to prioritize IoT security, especially for devices that are often overlooked or left unpatched. As attackers continue to exploit known vulnerabilities, proactive measures are essential to safeguard networks.

πŸ“… Story Timeline

Story broke by Fortinet Threat Research

Covered by Cyber Security News

Covered by Security Affairs

Covered by The Hacker News

πŸ”Ž Source Perspective Analysis

Technical Focus

β€œThe technical analysis emphasizes the modular architecture of Nexcorium, highlighting its sophisticated mechanisms for persistence and DDoS capabilities.”

Source: Fortinet

Business Impact Focus

β€œThe business implications stress the urgency for organizations to secure IoT devices to prevent exploitation and potential operational disruptions.”

Source: Security Affairs

Policy Focus

β€œThe policy perspective calls for stronger regulations and guidelines to address the vulnerabilities inherent in IoT devices, particularly those that are outdated or no longer supported.”

Source: FortiGuard Labs

Related Pings