Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

Posted on December 9, 2025December 9, 2025 By CWS

The newly recognized Mirai-based Broadside botnet has been concentrating on susceptible digital video recorder (DVR) merchandise from TBK Imaginative and prescient in a marketing campaign that might pose a major menace to the maritime logistics sector, Cydome studies.

The Broadside malware infects TBK DVR gadgets impacted by CVE-2024-3721, an OS command injection flaw that may be exploited remotely for arbitrary code execution.

The inadequate validation of user-supplied enter permits distant, unauthenticated attackers to execute arbitrary code through crafted HTTP requests.

Whereas the flaw was recognized on TBK DVR-4104 and DVR-4216 gadgets, TBK’s fashions are rebranded and offered below different names as nicely, together with CeNova, HVR Login, Night time Owl, Novo, Pulnix, QSee, and Securus.

The safety defect was publicly disclosed in April 2024, when proof-of-concept (PoC) code concentrating on it was already out there.

By mid-2025, a number of botnets able to launching distributed denial-of-service (DDoS) had already been exploiting the flaw.

Kaspersky mentioned in early June that there had been over 50,000 uncovered DVR gadgets, with infections in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.

A number of weeks later, Fortinet warned of a surge in exploitation makes an attempt, attributed to the Condi, Fodcha, Mirai, and Unstable botnets.Commercial. Scroll to proceed studying.

Now, Cydome says the Broadside botnet has joined the fray, concentrating on susceptible gadgets to execute a mass loader script straight into their reminiscence.

The loader blindly makes an attempt to fetch and run payloads concentrating on all supported architectures, executes the malware in reminiscence, and removes artifacts from the disk to evade detection.

The identical as different Mirai offsprings, the Broadside botnet has DDoS capabilities, through UDP flooding, however employs a customized command-and-control (C&C) protocol, and makes use of Netlink kernel sockets for course of monitoring.

Cydome additionally noticed the malware trying to reap system credential information, possible for lateral motion into the compromised community.

Moreover, Broadside has a course of killer module that makes an attempt to keep up management over the system by terminating processes that match particular patterns, fail checks, or are thought-about hostile.

The cybersecurity agency underlines the menace the brand new marketing campaign poses to transport firms, because the focused DVRs are usually used on vessels.

Thus, the contaminated gadgets may very well be used to faucet into CCTV feeds for a vessel’s bridge, cargo holds, and engine room, to flood a ship’s satellite tv for pc communication, or transfer laterally to important OT methods on the ship.

Associated: Aisuru Botnet Powers Report DDoS Assault Peaking at 29 Tbps

Associated: RondoDox Botnet Takes ‘Exploit Shotgun’ Method

Associated: Mirai Botnets Exploiting Wazuh Safety Platform Vulnerability

Associated: TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Assaults

Security Week News Tags:Botnet, Broadside, Companies, Poses, Risk, Shipping

Post navigation

Previous Post: How to Streamline Zero Trust Using the Shared Signals Framework
Next Post: Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 

Related Posts

Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments Security Week News
Neon Cyber Emerges from Stealth, Shining a Light into the Browser Security Week News
Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers Security Week News
In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked Security Week News
SesameOp Malware Abuses OpenAI API  Security Week News
Industry Reactions to Trump Cybersecurity Executive Order: Feedback Friday Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation
  • Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems
  • Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware
  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 20,000 WordPress Sites Affected by Backdoor Vulnerability Allowing Malicious Admin User Creation
  • Threat Actors Weaponizes LNK File to Deploy MoonPeak Malware Attacking Windows Systems
  • Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware
  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
  • MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark