Hackers Exploit CVE-2024-3721 To Deploy Nexcorium Malware On TBK DVRs
Recently, security researchers at Fortinet’s FortiGuard Labs discovered a new threat campaign exploiting a known vulnerability, CVE-2024-3721, in TBK digital video recorders (DVRs).
The attackers are using this flaw to distribute Nexcorium, a dangerous new variant of the notorious Mirai botnet, turning compromised devices into tools for massive distributed denial-of-service (DDoS) attacks.
The attack begins when hackers exploit CVE-2024-3721, an OS command injection vulnerability that specifically affects TBK DVR models such as DVR-4104 and DVR-4216.
By manipulating specific device arguments, attackers execute a malicious downloader script. Interestingly, FortiGuard Labs noted that the exploit traffic includes a custom HTTP header reading “X-Hacked-By: Nexus Team – Exploited By Erratic”.
This unique artifact has led researchers to attribute the campaign to a relatively unknown threat group calling itself the “Nexus Team”.
Once the downloader script runs, it fetches multi-architecture malware binaries to ensure compatibility across various Linux systems, including ARM and x86-64.
Nexcorium shares its core structure with other Mirai variants, functioning through three main modules: a watchdog, a scanner, and an attacker.
To spread further, the malware initiates Telnet brute-force attacks using a hard-coded list of weak default passwords. Furthermore, the botnet relies on an older exploit, CVE-2017-17215, to compromise Huawei devices, rapidly increasing its infection reach.
To maintain long-term access on a compromised victim host, Nexcorium employs multiple persistence mechanisms. After successfully invading a system, the malware copies itself to a hidden system directory.
It establishes startup persistence through four distinct methods:
After securing its foothold, Nexcorium deletes its original executable file to hide its tracks and evade security analysis.
According to Fortinet research, to defend against the Nexcorium botnet, cybersecurity experts strongly advise organizations to implement immediate mitigation strategies.
Network administrators should ensure that all IoT devices, particularly TBK DVRs and legacy routers, are updated to the latest firmware. Default passwords must be changed immediately to prevent brute-force intrusions.
Additionally, organizations should deploy robust network filtering to block communication with known malicious C2 domains and leverage modern threat intelligence services to detect suspicious scanning behavior before an infection can take hold.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Hackers Exploit CVE-2024-3721 To Deploy Nexcorium Malware On TBK DVRs appeared first on Cyber Security News.
Illustration by Heather Landis An ALPR snaps photos of passing cars. Its purpose is to…
Photo by Joan Marcus/Disney Many Broadway actors leave once a contract is up. You’ve been…
With prices of electric bikes reaching an all-time low, it's time to retire that pedal-powered…
Star Wars actor Oscar Isaac has admitted that his much-memed "Somehow, Palpatine returned" line was…
Introduction The need for artificial intelligence security has never been greater as it continues to…
Financial crime was once an unfortunate, yet unavoidable, consequence of an increasingly sophisticated economy. But…
This website uses cookies.