Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Mirai Variant Targets TBK DVRs with CVE-2024-3721

New Mirai Variant Targets TBK DVRs with CVE-2024-3721

Posted on April 18, 2026 By CWS

Cybersecurity experts have uncovered a new variant of the notorious Mirai botnet, identified as Nexcorium, exploiting vulnerabilities in TBK DVR devices. This revelation comes from research conducted by Fortinet FortiGuard Labs and Palo Alto Networks Unit 42. The attack leverages a security flaw, CVE-2024-3721, within TBK DVR-4104 and DVR-4216 devices to infiltrate systems and deploy the malware.

Exploitation of IoT Vulnerabilities

IoT devices are increasingly targeted due to their widespread deployment and often lax security measures. According to security researcher Vincent Li, these devices are vulnerable to large-scale attacks, primarily due to insufficient patching and weak security configurations. Threat actors exploit known vulnerabilities to gain initial access, allowing them to deploy malware for persistent and widespread distributed denial-of-service (DDoS) attacks.

This vulnerability has been previously exploited to deploy Mirai variants and the RondoDox botnet. In September 2025, CloudSEK reported a loader-as-a-service botnet distributing various malware, including RondoDox and Mirai, through weak credentials in routers and IoT devices.

Nexcorium’s Advanced Features

The attack method involves exploiting CVE-2024-3721 to execute a downloader script, which then initiates the botnet payload on the targeted system’s architecture. Upon execution, the malware displays a takeover message from ‘nexuscorp.’ The Nexcorium variant features a structure similar to Mirai, with modules for configuration table initialization, DDoS attacks, and a watchdog.

Furthermore, the malware exploits CVE-2017-17215 to target Huawei HG532 devices, using hard-coded credentials for brute-force attacks over Telnet. Successful logins allow the malware to establish persistence via crontab and systemd, connecting to external servers for DDoS command execution. To avoid detection, it removes the original binary post-installation.

Continued Threats to Network Security

Unit 42 has also identified automated scans attempting to exploit another vulnerability, CVE-2023-33538, in outdated TP-Link routers. Although these attempts are flawed, they highlight the ongoing threat posed by legacy devices. This vulnerability, added to CISA’s Known Exploited Vulnerabilities catalog, affects several TP-Link models.

The compromised routers are susceptible to a Mirai-like botnet, with code referencing ‘Condi’ and capabilities to self-update and act as a web server for spreading infections. Given the end-of-life status of these routers, users are advised to upgrade to newer models and change default credentials.

Security researchers emphasize that the persistent risk of default credentials in IoT devices will continue to influence the cybersecurity landscape. This vulnerability can transform an otherwise minor flaw into a critical security breach.

The Hacker News Tags:Botnet, CVE-2024-3721, DDoS, IoT security, Mirai, network security, Nexcorium, TBK DVR, TP-Link, Vulnerability

Post navigation

Previous Post: Critical FortiSandbox Flaw Exploited: Immediate Action Required
Next Post: Grinex Exchange Halts After $13.74M Cyber Heist Linked to Intelligence

Related Posts

FortiGate Exploits Highlight Ongoing Cyber Threats FortiGate Exploits Highlight Ongoing Cyber Threats The Hacker News
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks The Hacker News
Chaos RaaS Emerges After BlackSuit Takedown, Demanding 0K from U.S. Victims Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims The Hacker News
Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds The Hacker News
Notepad++ Secures Update Process Against Malware Threat Notepad++ Secures Update Process Against Malware Threat The Hacker News
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ZionSiphon Malware Targets Israeli Water Systems
  • NIST Adopts Risk-Based Approach Amid Rising CVE Submissions
  • Hackers Struggle with TP-Link Router Vulnerability
  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ZionSiphon Malware Targets Israeli Water Systems
  • NIST Adopts Risk-Based Approach Amid Rising CVE Submissions
  • Hackers Struggle with TP-Link Router Vulnerability
  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark