Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

Posted on December 9, 2025December 9, 2025 By CWS

The newly recognized Mirai-based Broadside botnet has been concentrating on susceptible digital video recorder (DVR) merchandise from TBK Imaginative and prescient in a marketing campaign that might pose a major menace to the maritime logistics sector, Cydome studies.

The Broadside malware infects TBK DVR gadgets impacted by CVE-2024-3721, an OS command injection flaw that may be exploited remotely for arbitrary code execution.

The inadequate validation of user-supplied enter permits distant, unauthenticated attackers to execute arbitrary code through crafted HTTP requests.

Whereas the flaw was recognized on TBK DVR-4104 and DVR-4216 gadgets, TBK’s fashions are rebranded and offered below different names as nicely, together with CeNova, HVR Login, Night time Owl, Novo, Pulnix, QSee, and Securus.

The safety defect was publicly disclosed in April 2024, when proof-of-concept (PoC) code concentrating on it was already out there.

By mid-2025, a number of botnets able to launching distributed denial-of-service (DDoS) had already been exploiting the flaw.

Kaspersky mentioned in early June that there had been over 50,000 uncovered DVR gadgets, with infections in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.

A number of weeks later, Fortinet warned of a surge in exploitation makes an attempt, attributed to the Condi, Fodcha, Mirai, and Unstable botnets.Commercial. Scroll to proceed studying.

Now, Cydome says the Broadside botnet has joined the fray, concentrating on susceptible gadgets to execute a mass loader script straight into their reminiscence.

The loader blindly makes an attempt to fetch and run payloads concentrating on all supported architectures, executes the malware in reminiscence, and removes artifacts from the disk to evade detection.

The identical as different Mirai offsprings, the Broadside botnet has DDoS capabilities, through UDP flooding, however employs a customized command-and-control (C&C) protocol, and makes use of Netlink kernel sockets for course of monitoring.

Cydome additionally noticed the malware trying to reap system credential information, possible for lateral motion into the compromised community.

Moreover, Broadside has a course of killer module that makes an attempt to keep up management over the system by terminating processes that match particular patterns, fail checks, or are thought-about hostile.

The cybersecurity agency underlines the menace the brand new marketing campaign poses to transport firms, because the focused DVRs are usually used on vessels.

Thus, the contaminated gadgets may very well be used to faucet into CCTV feeds for a vessel’s bridge, cargo holds, and engine room, to flood a ship’s satellite tv for pc communication, or transfer laterally to important OT methods on the ship.

Associated: Aisuru Botnet Powers Report DDoS Assault Peaking at 29 Tbps

Associated: RondoDox Botnet Takes ‘Exploit Shotgun’ Method

Associated: Mirai Botnets Exploiting Wazuh Safety Platform Vulnerability

Associated: TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Assaults

Security Week News Tags:Botnet, Broadside, Companies, Poses, Risk, Shipping

Post navigation

Previous Post: How to Streamline Zero Trust Using the Shared Signals Framework
Next Post: Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 

Related Posts

Virtual Event Today: Threat Detection & Incident Response (TDIR) Summit Security Week News
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Security Week News
Opti Raises $20 Million for Identity Security Platform Security Week News
European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested Security Week News
Open VSX Downplays Impact From GlassWorm Campaign Security Week News
Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data
  • Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security
  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
  • Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data
  • Adobe Acrobat Reader Vulnerabilities let Attackers Execute Arbitrary Code and Bypass Security
  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
  • Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark