Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Mirai Variant Targets TBK DVRs with CVE-2024-3721

New Mirai Variant Targets TBK DVRs with CVE-2024-3721

Posted on April 18, 2026 By CWS

Cybersecurity experts have uncovered a new variant of the notorious Mirai botnet, identified as Nexcorium, exploiting vulnerabilities in TBK DVR devices. This revelation comes from research conducted by Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack leverages a security flaw, CVE-2024-3721, within TBK DVR-4104 and DVR-4216 devices to infiltrate systems and deploy the malware.

Exploitation of IoT Vulnerabilities

IoT devices are increasingly targeted due to their widespread deployment and often lax security measures. According to security researcher Vincent Li, these devices are vulnerable to large-scale attacks, primarily due to insufficient patching and weak security configurations. Threat actors exploit known vulnerabilities to gain initial access, allowing them to deploy malware for persistent and widespread distributed denial-of-service (DDoS) attacks.

This vulnerability has been previously exploited to deploy Mirai variants and the RondoDox botnet. In September 2025, CloudSEK reported a loader-as-a-service botnet distributing various malware, including RondoDox and Mirai, through weak credentials in routers and IoT devices.

Nexcorium’s Advanced Features

The attack method involves exploiting CVE-2024-3721 to execute a downloader script, which then initiates the botnet payload on the targeted system’s architecture. Upon execution, the malware displays a takeover message from ‘nexuscorp.’ The Nexcorium variant features a structure similar to Mirai, with modules for configuration table initialization, DDoS attacks, and a watchdog.

Furthermore, the malware exploits CVE-2017-17215 to target Huawei HG532 devices, using hard-coded credentials for brute-force attacks over Telnet. Successful logins allow the malware to establish persistence via crontab and systemd, connecting to external servers for DDoS command execution. To avoid detection, it removes the original binary post-installation.

Continued Threats to Network Security

Unit 42 has also identified automated scans attempting to exploit another vulnerability, CVE-2023-33538, in outdated TP-Link routers. Although these attempts are flawed, they highlight the ongoing threat posed by legacy devices. This vulnerability, added to CISA’s Known Exploited Vulnerabilities catalog, affects several TP-Link models.

The compromised routers are susceptible to a Mirai-like botnet, with code referencing ‘Condi’ and capabilities to self-update and act as a web server for spreading infections. Given the end-of-life status of these routers, users are advised to upgrade to newer models and change default credentials.

Security researchers emphasize that the persistent risk of default credentials in IoT devices will continue to influence the cybersecurity landscape. This vulnerability can transform an otherwise minor flaw into a critical security breach.

The Hacker News Tags:Botnet, CVE-2024-3721, DDoS, IoT security, Mirai, network security, Nexcorium, TBK DVR, TP-Link, Vulnerability

Post navigation

Previous Post: Critical FortiSandbox Flaw Exploited: Immediate Action Required
Next Post: Grinex Exchange Halts After $13.74M Cyber Heist Linked to Intelligence

Related Posts

Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) The Hacker News
New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack The Hacker News
Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with 0K in Rewards Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News
Filling the Most Common Gaps in Google Workspace Security Filling the Most Common Gaps in Google Workspace Security The Hacker News
NGINX Vulnerability Exploited in Web Traffic Hijacking NGINX Vulnerability Exploited in Web Traffic Hijacking The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Millions of FTP Servers Remain Unencrypted, Report Finds
  • Notion Public Pages Expose Editor Information
  • Vercel Confirms Intrusion After Hacker’s Data Sale Offer
  • ZionSiphon Malware Targets Israeli Water Systems
  • NIST Adopts Risk-Based Approach Amid Rising CVE Submissions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Millions of FTP Servers Remain Unencrypted, Report Finds
  • Notion Public Pages Expose Editor Information
  • Vercel Confirms Intrusion After Hacker’s Data Sale Offer
  • ZionSiphon Malware Targets Israeli Water Systems
  • NIST Adopts Risk-Based Approach Amid Rising CVE Submissions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark