menu
techminis

A naukri.com initiative

google-web-stories
Home

>

IOT News

>

Analysis o...
source image

Securelist

3d

read

381

img
dot

Image Credit: Securelist

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

  • The article discusses the exploitation of CVE-2024-3721 to deploy a Mirai bot on vulnerable DVR devices.
  • CVE-2024-3721 enables execution of system commands on TBK DVRs via a specific POST request.
  • The malicious POST request contains a shell script to download and execute an ARM32 binary.
  • The Mirai bot variant targeting DVR devices includes features like RC4 encryption and anti-VM checks.
  • RC4 key decryption is used to decrypt strings within the malware implant.
  • The implant conducts checks to detect if it is running within a virtual machine environment.
  • Infection statistics reveal that many infected DVR devices are located in countries like China, India, Egypt, and Ukraine.
  • Over 50,000 vulnerable DVR devices have been identified online, indicating a significant attack surface.
  • To mitigate such threats, updating vulnerable devices promptly and conducting factory resets for exposed devices is recommended.
  • Kaspersky products detect the threat as HEUR:Backdoor.Linux.Mirai and HEUR:Backdoor.Linux.Gafgyt.

Read Full Article

like

22 Likes

For uninterrupted reading, download the app