Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ‘Broadside’ Botnet Poses Risk to Shipping Companies

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

Posted on December 9, 2025December 9, 2025 By CWS

The newly recognized Mirai-based Broadside botnet has been concentrating on susceptible digital video recorder (DVR) merchandise from TBK Imaginative and prescient in a marketing campaign that might pose a major menace to the maritime logistics sector, Cydome studies.

The Broadside malware infects TBK DVR gadgets impacted by CVE-2024-3721, an OS command injection flaw that may be exploited remotely for arbitrary code execution.

The inadequate validation of user-supplied enter permits distant, unauthenticated attackers to execute arbitrary code through crafted HTTP requests.

Whereas the flaw was recognized on TBK DVR-4104 and DVR-4216 gadgets, TBK’s fashions are rebranded and offered below different names as nicely, together with CeNova, HVR Login, Night time Owl, Novo, Pulnix, QSee, and Securus.

The safety defect was publicly disclosed in April 2024, when proof-of-concept (PoC) code concentrating on it was already out there.

By mid-2025, a number of botnets able to launching distributed denial-of-service (DDoS) had already been exploiting the flaw.

Kaspersky mentioned in early June that there had been over 50,000 uncovered DVR gadgets, with infections in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.

A number of weeks later, Fortinet warned of a surge in exploitation makes an attempt, attributed to the Condi, Fodcha, Mirai, and Unstable botnets.Commercial. Scroll to proceed studying.

Now, Cydome says the Broadside botnet has joined the fray, concentrating on susceptible gadgets to execute a mass loader script straight into their reminiscence.

The loader blindly makes an attempt to fetch and run payloads concentrating on all supported architectures, executes the malware in reminiscence, and removes artifacts from the disk to evade detection.

The identical as different Mirai offsprings, the Broadside botnet has DDoS capabilities, through UDP flooding, however employs a customized command-and-control (C&C) protocol, and makes use of Netlink kernel sockets for course of monitoring.

Cydome additionally noticed the malware trying to reap system credential information, possible for lateral motion into the compromised community.

Moreover, Broadside has a course of killer module that makes an attempt to keep up management over the system by terminating processes that match particular patterns, fail checks, or are thought-about hostile.

The cybersecurity agency underlines the menace the brand new marketing campaign poses to transport firms, because the focused DVRs are usually used on vessels.

Thus, the contaminated gadgets may very well be used to faucet into CCTV feeds for a vessel’s bridge, cargo holds, and engine room, to flood a ship’s satellite tv for pc communication, or transfer laterally to important OT methods on the ship.

Associated: Aisuru Botnet Powers Report DDoS Assault Peaking at 29 Tbps

Associated: RondoDox Botnet Takes ‘Exploit Shotgun’ Method

Associated: Mirai Botnets Exploiting Wazuh Safety Platform Vulnerability

Associated: TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Assaults

Security Week News Tags:Botnet, Broadside, Companies, Poses, Risk, Shipping

Post navigation

Previous Post: How to Streamline Zero Trust Using the Shared Signals Framework
Next Post: Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 

Related Posts

Data Stolen in Eurofiber France Hack Data Stolen in Eurofiber France Hack Security Week News
Urgent Replacement of Discontinued Edge Devices Advised Urgent Replacement of Discontinued Edge Devices Advised Security Week News
BlinkOps Raises  Million for Agentic Security Automation Platform BlinkOps Raises $50 Million for Agentic Security Automation Platform Security Week News
Japan Issues OT Security Guidance for Semiconductor Factories Japan Issues OT Security Guidance for Semiconductor Factories Security Week News
Malware Distributed via Cloned AI Tool Sites in New Campaign Malware Distributed via Cloned AI Tool Sites in New Campaign Security Week News
Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark