Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

Posted on December 9, 2025December 9, 2025 By CWS

The newly recognized Mirai-based Broadside botnet has been concentrating on susceptible digital video recorder (DVR) merchandise from TBK Imaginative and prescient in a marketing campaign that might pose a major menace to the maritime logistics sector, Cydome studies.

The Broadside malware infects TBK DVR gadgets impacted by CVE-2024-3721, an OS command injection flaw that may be exploited remotely for arbitrary code execution.

The inadequate validation of user-supplied enter permits distant, unauthenticated attackers to execute arbitrary code through crafted HTTP requests.

Whereas the flaw was recognized on TBK DVR-4104 and DVR-4216 gadgets, TBK’s fashions are rebranded and offered below different names as nicely, together with CeNova, HVR Login, Night time Owl, Novo, Pulnix, QSee, and Securus.

The safety defect was publicly disclosed in April 2024, when proof-of-concept (PoC) code concentrating on it was already out there.

By mid-2025, a number of botnets able to launching distributed denial-of-service (DDoS) had already been exploiting the flaw.

Kaspersky mentioned in early June that there had been over 50,000 uncovered DVR gadgets, with infections in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.

A number of weeks later, Fortinet warned of a surge in exploitation makes an attempt, attributed to the Condi, Fodcha, Mirai, and Unstable botnets.Commercial. Scroll to proceed studying.

Now, Cydome says the Broadside botnet has joined the fray, concentrating on susceptible gadgets to execute a mass loader script straight into their reminiscence.

The loader blindly makes an attempt to fetch and run payloads concentrating on all supported architectures, executes the malware in reminiscence, and removes artifacts from the disk to evade detection.

The identical as different Mirai offsprings, the Broadside botnet has DDoS capabilities, through UDP flooding, however employs a customized command-and-control (C&C) protocol, and makes use of Netlink kernel sockets for course of monitoring.

Cydome additionally noticed the malware trying to reap system credential information, possible for lateral motion into the compromised community.

Moreover, Broadside has a course of killer module that makes an attempt to keep up management over the system by terminating processes that match particular patterns, fail checks, or are thought-about hostile.

The cybersecurity agency underlines the menace the brand new marketing campaign poses to transport firms, because the focused DVRs are usually used on vessels.

Thus, the contaminated gadgets may very well be used to faucet into CCTV feeds for a vessel’s bridge, cargo holds, and engine room, to flood a ship’s satellite tv for pc communication, or transfer laterally to important OT methods on the ship.

Associated: Aisuru Botnet Powers Report DDoS Assault Peaking at 29 Tbps

Associated: RondoDox Botnet Takes ‘Exploit Shotgun’ Method

Associated: Mirai Botnets Exploiting Wazuh Safety Platform Vulnerability

Associated: TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Assaults

Security Week News Tags:Botnet, Broadside, Companies, Poses, Risk, Shipping

Post navigation

Previous Post: How to Streamline Zero Trust Using the Shared Signals Framework
Next Post: Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 

Related Posts

Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation Security Week News
Matters.AI Raises $6.25 Million to Safeguard Enterprise Data Security Week News
Bugcrowd Acquires Application Security Firm Mayhem Security Week News
Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News
Tiffany Data Breach Impacts Thousands of Customers Security Week News
Marks & Spencer Says Data Stolen in Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell Attacks Linked to North Korean Hackers
  • Critical Emby Server Vulnerability Let Attackers Gain Admin Access
  • Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
  • Google Announces 10 New AI Features for Google Chrome Powered by Gemini
  • Zoom Rooms for Windows and macOS Flaws Enable Privilege Escalation and Sensitive Data Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell Attacks Linked to North Korean Hackers
  • Critical Emby Server Vulnerability Let Attackers Gain Admin Access
  • Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
  • Google Announces 10 New AI Features for Google Chrome Powered by Gemini
  • Zoom Rooms for Windows and macOS Flaws Enable Privilege Escalation and Sensitive Data Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark