TVT DVRs become prime target for Mirai botnet

featured-image

Mirai operators are actively scanning for TVT DVRs vulnerable to a 2024 bug.

GreyNoise says scannings for vulnerable TVT DVRs are spiking More than 2,500 unique IP addresses were hunting at one point A 2024 vulnerability allows threat actors to run admin commands on the device Operators of the Mirai botnet are actively hunting for vulnerable TVT DVRs to assimilate them into the nefarious network, cybersecurity researchers GreyNoise have revealed after observing a spike in exploitation attempts. In May 2024, security researchers from SSD Secure Disclosure reported on a vulnerability affecting NVMS9000 DVRs built by the Shenzhen-based TVT Digital Technology manufacturer. The vulnerability was described as an authentication bypass, allowing threat actors to run admin commands on the device unabated.

All versions prior to 1.3.4 were said to be affected, but a patch was released and versions 1.



3.4 and newer were no longer vulnerable. Dangerous new botnet targets webcams, routers across the world This dangerous malware botnet now covers 1.

6 million Android TVs - find out if you're at risk Monitor your credit score with TransUnion starting at $29.95/month TransUnion is a credit monitoring service that helps you stay on top of your financial health. With real-time alerts, credit score tracking, and identity theft protection, it ensures you never miss important changes.

You'll benefit from a customizable online interface with clear insights into your credit profile. Businesses also benefit from TransUnion’s advanced risk assessment tools. Preferred partner ( What does this mean? ) "No malicious files hosted" Users who don’t keep track of updates and don’t patch their systems on time are now at risk.

GreyNoise said that on April 3 the attack peaked, with more than 2,500 unique IP addresses scanning for vulnerable endpoints. We don’t know how many of these DVRs there are or how big the attack surface might be. The researchers said that the malware being deployed on the DVRs is tied to Mirai, one of the most infamous botnets in cybersecurity history.

Mirai usually targets smart devices, Internet of Things (IoT) devices, and internet-connected hardware, and is used to run disruptive Distributed Denial of Service (DDoS) attacks. GreyNoise said that in the past 30 days it logged 6,600 unique IP addresses associated with this activity. All of the addresses were confirmed to be malicious.

They mostly came from Taiwan, Japan, and South Korea, targeting devices in the US, UK, and Germany. Mirai operators are quite active this year. In mid-January, news broke that they targeted industrial routers vulnerable to a zero-day.

A few weeks later, security researchers from Akamai said they caught a new variant of the botnet targeting business phone devices built by Mitel. Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Via BleepingComputer Watch out, your office phone could be hijacked into a Mirai botnet We've rounded up the best password managers Take a look at our guide to the best endpoint protection.