Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

ZionSiphon Malware Targets Water Infrastructure Systems

April 20, 2026

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

April 20, 2026

Attackers Exploit DVR Command Injection Flaw to Deploy Botnet

April 20, 2026
Facebook X (Twitter) Instagram
Monday, April 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Attackers Exploit DVR Command Injection Flaw to Deploy Botnet
News

Attackers Exploit DVR Command Injection Flaw to Deploy Botnet

Team-CWDBy Team-CWDApril 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified malware campaign has been observed exploiting a command injection flaw in digital video recorder (DVR) devices to deploy a Mirai-based botnet, according to analysis by FortiGuard Labs.

The activity targets CVE-2024-3721 in TBK DVR systems, enabling attackers to gain access and install a multi-architecture Mirai variant malware known as Nexcorium.

Fortinet researchers found that the attack begins with crafted requests abusing vulnerable parameters to execute a downloader script. This script retrieves malicious binaries tailored for different Linux environments, including ARM, MIPS and x86-64 systems, then executes them with elevated permissions.

Evidence within the attack traffic includes a custom HTTP header referencing “Nexus Team,” which analysts believe may point to a previously untracked threat actor. Upon execution, the malware announces control of the compromised system, signaling a successful infection.

“The Nexcorium campaign is a precise illustration of why automated scanning alone cannot close the exposure gap,” Trey Ford, chief strategy and trust officer at Bugcrowd, said. “Machine speed analysis tells you a vulnerability exists, but human researcher depth tells you how an adversary will chain it, weaponize it and sustain access long after the initial alert fires.”

Multi-Stage Infection and Persistence Techniques

Once deployed, Nexcorium initializes a configuration set hidden through XOR encoding. This includes command-and-control (C2) server details, attack instructions and a built-in credential list used for brute-force activity.

The malware closely mirrors traditional Mirai architecture, with modules dedicated to scanning, persistence and attack execution.

The scanner component attempts to propagate by exploiting known weaknesses and leveraging default credentials over Telnet connections. Among its embedded exploits is CVE-2017-17215, a vulnerability affecting Huawei routers, which expands its reach beyond the initial DVR targets.

In practice, the malware combines several techniques to scale infections. It exploits CVE-2024-3721 for initial access, uses default credentials to move laterally, targets multiple CPU architectures and incorporates legacy exploits to broaden its reach across vulnerable devices.

Persistence is achieved through several mechanisms. The malware modifies system initialization files, creates startup scripts and registers system services to ensure execution after reboot. It also schedules recurring tasks via cron jobs, allowing it to survive system restarts and maintain long-term access.

Read more on IoT botnet threats: New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices

DDoS Capabilities and Operational Impact

After establishing persistence, Nexcorium connects to a remote command server to receive instructions.

It supports a wide range of distributed denial-of-service (DoS) methods, including UDP floods, TCP SYN floods and application-layer attacks such as SMTP flooding.

Attack commands are dynamically issued by the C2 infrastructure, enabling coordinated campaigns across infected devices. The malware can also terminate ongoing attacks or remove itself when instructed, suggesting centralized control over botnet operations.

“Enterprises have had their fleets of IoT and OT devices used by Mirai and its variants for some time, particularly for DDoS attacks,” John Gallagher, vice president of Viakoo Labs at IoT security firm Viakoo, said. “Until more action is taken by enterprises to maintain cyber hygiene on IoT devices, this will continue because of the ease of infection and ability to move laterally.”

Security teams should focus on foundational controls for IoT environments, Gallagher said, noting that traditional agent-based tools are often ineffective.

“IoT devices don’t allow agents to be hosted on them, so only agentless discovery and remediation solutions can apply,” he added. “Other best practices for IoT security include automated methods for password and certificate management as well as firmware management.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCitizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Next Article Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621
Team-CWD
  • Website

Related Posts

News

ZionSiphon Malware Targets Water Infrastructure Systems

April 20, 2026
News

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

April 20, 2026
News

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

April 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

What parents should know to protect their children from doxxing

November 28, 2025

Children and chatbots: What parents should know

January 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.