Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
A new wave of Mirai botnet attacks is exploiting CVE-2024-3721 to target TBK DVR devices. The campaign uses a POST request to execute system commands without authorization, downloading and running an ARM32 binary. This Mirai variant includes features like RC4 string encryption, anti-VM checks, and anti-emulation techniques. The malware verifies if it's running in a virtual environment and checks for allowed directories. Infected devices are primarily located in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Over 50,000 exposed DVR devices are potentially vulnerable. The botnet's main goal is to conduct DDoS attacks. Updating vulnerable devices and performing factory resets are recommended as protective measures.
AI Analysis
Technical Summary
The threat described involves a new wave of attacks by a Mirai botnet variant exploiting a recently disclosed vulnerability identified as CVE-2024-3721. This vulnerability affects TBK brand Digital Video Recorder (DVR) devices, which are commonly used in surveillance and security camera systems. The exploitation method involves sending a specially crafted POST request that allows unauthenticated attackers to execute arbitrary system commands on the targeted device. Upon successful exploitation, the attacker downloads and executes an ARM32 binary payload, which is a variant of the Mirai malware. This variant incorporates advanced evasion techniques such as RC4 string encryption to obfuscate its code and communications, anti-virtual machine (VM) checks, and anti-emulation methods to avoid detection and analysis in sandboxed or virtualized environments. The malware also verifies that it is running in allowed directories before proceeding, which further complicates forensic analysis and detection. The primary objective of this botnet is to conscript vulnerable DVR devices into a large-scale distributed denial-of-service (DDoS) botnet, leveraging their network connectivity and processing power to overwhelm targeted systems or networks. The campaign has identified over 50,000 exposed TBK DVR devices as potentially vulnerable, with infections primarily reported in countries including China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Although the campaign is currently not reported to have active exploits in the wild beyond initial observations, the scale of vulnerable devices and the sophistication of the malware indicate a significant threat vector. The lack of available patches or firmware updates for these devices exacerbates the risk, making mitigation reliant on device resets and network-level protections. The technical sophistication of the malware, combined with the critical role of DVR devices in security infrastructure, underscores the importance of addressing this vulnerability promptly.
Potential Impact
For European organizations, the exploitation of CVE-2024-3721 in TBK DVR devices presents several risks. Many organizations, including enterprises, government agencies, and critical infrastructure operators, rely on DVRs for surveillance and security monitoring. Compromise of these devices can lead to unauthorized access to video feeds, loss of confidentiality, and potential manipulation or disruption of security monitoring. More critically, infected devices become part of a botnet used to launch DDoS attacks, which can degrade or disrupt network availability not only for the infected organization but also for external targets. This can result in service outages, reputational damage, and financial losses. Additionally, the presence of malware on security devices undermines trust in physical security systems and may complicate incident response efforts. The anti-VM and anti-emulation features of the malware make detection and analysis more difficult, potentially allowing infections to persist undetected for longer periods. Given the interconnected nature of IoT and security devices, lateral movement or further exploitation could be possible if attackers leverage these compromised DVRs as footholds. The medium severity rating reflects the combination of ease of exploitation (no authentication required), the scale of vulnerable devices, and the potential for significant operational disruption through DDoS activities.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should take several targeted actions beyond generic IoT security advice: 1) Conduct an immediate inventory of all TBK DVR devices within their networks to identify potentially vulnerable units. 2) Where possible, apply firmware updates or patches provided by the vendor; if no official patches exist, contact the vendor for guidance or consider device replacement. 3) Perform factory resets on affected devices to remove any persistent malware infections. 4) Segment DVR devices on isolated network segments with strict access controls to limit exposure and prevent lateral movement. 5) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) tuned to detect Mirai-related traffic patterns and anomalous POST requests targeting DVR devices. 6) Employ egress filtering to restrict unauthorized outbound connections from IoT devices, limiting botnet command and control communications. 7) Monitor network traffic for signs of DDoS activity originating from internal devices and establish incident response procedures for rapid containment. 8) Disable unnecessary services and change default credentials on all IoT and DVR devices to reduce attack surface. 9) Consider deploying honeypots or deception technologies to detect attempts to exploit this vulnerability. 10) Collaborate with national cybersecurity centers and ISACs to share threat intelligence and receive timely updates on emerging exploits.
Affected Countries
Russia, Ukraine, Turkey, Germany, France, Italy, United Kingdom, Poland, Netherlands, Spain
Indicators of Compromise
- hash: 011a406e89e603e93640b10325ebbdc8
- hash: 24fd043f9175680d0c061b28a2801dfc
- hash: 29b83f0aae7ed38d27ea37d26f3c9117
- hash: 2e9920b21df472b4dd1e8db4863720bf
- hash: 3120a5920f8ff70ec6c5a45d7bf2acc8
- hash: 3c2f6175894bee698c61c6ce76ff9674
- hash: 45a41ce9f4d8bb2592e8450a1de95dcc
- hash: 524a57c8c595d9d4cd364612fe2f057c
- hash: 6e7976666525a97639777d2d7f303177
- hash: 74dee23eaa98e2e8a7fc355f06a11d97
- hash: 761909a234ee4f1d856267abe30a3935
- hash: 7eb3d72fa7d730d3dbca4df34fe26274
- hash: 8a3e1176cb160fb42357fa3f46f0cbde
- hash: 8d92e79b7940f0ac5b01bbb77737ca6c
- hash: 95eaa3fa47a609ceefa24e8c7787bd99
- hash: 96ee8cc2edc8227a640cef77d4a24e83
- hash: aaf34c27edfc3531cf1cf2f2e9a9c45b
- hash: ba32f4eef7de6bae9507a63bde1a43aa
- hash: 02a9b16a19a03e75d42d1c9c83fa4a5414ce26dc
- hash: 05168a7a2816dc792d80f0a7c65b102b38e93bf1
- hash: 069a400624f2fcf69bca8a43fd52c05e95758927
- hash: 152b73f3e91eba572cbd8470a0f01adf363b7d64
- hash: 22b2333298b7cc9913c1eaf422dbe8830840d3e0
- hash: 2d877399e481a6ebded108631b55ff049c3316f4
- hash: 2e95bbf3069f603ae7ff882770f49dc36223a626
- hash: 46ee0aac6d64415146792c40a7f94989b5510107
- hash: 5160989ba4f8a75ef4e09dea0fda3bf7a2211fb7
- hash: 69adf42ea2216846631a85791b653b6ccbc45fb4
- hash: 6c4cbd259aa9d2a7f858ae607aa36da928f9268e
- hash: 961c5cb9288292a58c3df007948dbb8e3602192d
- hash: c57a8ef11ec531eafd62dcb6c3ae558ea59bed08
- hash: e77427eafc1ad985d83a37f68492318affaf466f
- hash: f836182a8a93db7985cdd67a5c1f5dbbf90bbe2a
- hash: 1c39dbf66a362df572af7ad64164cc7d70a8875db68a710979d243760d8c027b
- hash: 29754b61a1cce8c965bbc98efb125991b8b605dea9f3394c277092f30a109bdb
- hash: 2a397594a3b009df342886a3480264a8773971559c79c8f95b1319eae77c55d6
- hash: 3bdbed482342487e08f5266e1a9b6478fcd0be645edcfb1e8c6dda1dac73cce9
- hash: 438dc2a85e37356eefd2d40ac7bafa8c3ad273dd36991d4b155208c3a3d460b5
- hash: 4abacef49032666c0d0b4a006368386bdc6c0367f6c5e21b022b650fb8dabdbc
- hash: 52bd9e57f7db2716d2ec570bc9a5de9ba96bc620edb3ac9469b5b131b004a030
- hash: 7461c0f8feac69a39586c4c1ecfeb32627c5a83043721ba0144479efc0f036a1
- hash: 86ef39910b9361f012f889146e16b2e279a07465fe3e2f9b493ef0534a5c66c0
- hash: 9ae1955b9de5e4e6b23e55d2aab3230ff3a6b5c723d77a6653b2145719dc2eb6
- hash: b2be07ed781bcdef614cd7c1461d81bfd8df2bc7eb11b6bfb5b202af881d727c
- hash: dd2c66661d94f007d87754dcbc1ace9f228785676632a39fef2ce0e26d54e206
- hash: dd54e4a0220b6afbe0dbee66e32af3fe2012cc37023044a683e8e0c98579a059
- hash: e5f9a505082501b32d442a3fa6a9fb40a48b7da91a5a0efc5677bed5401e0c2b
- hash: f3989e7cca7d17c909c5f53945c7846d2d269d32113042bf535285c4d75624e6
- ip: 42.112.26.36
- ip: 63.231.92.27
Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
Description
A new wave of Mirai botnet attacks is exploiting CVE-2024-3721 to target TBK DVR devices. The campaign uses a POST request to execute system commands without authorization, downloading and running an ARM32 binary. This Mirai variant includes features like RC4 string encryption, anti-VM checks, and anti-emulation techniques. The malware verifies if it's running in a virtual environment and checks for allowed directories. Infected devices are primarily located in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Over 50,000 exposed DVR devices are potentially vulnerable. The botnet's main goal is to conduct DDoS attacks. Updating vulnerable devices and performing factory resets are recommended as protective measures.
AI-Powered Analysis
Technical Analysis
The threat described involves a new wave of attacks by a Mirai botnet variant exploiting a recently disclosed vulnerability identified as CVE-2024-3721. This vulnerability affects TBK brand Digital Video Recorder (DVR) devices, which are commonly used in surveillance and security camera systems. The exploitation method involves sending a specially crafted POST request that allows unauthenticated attackers to execute arbitrary system commands on the targeted device. Upon successful exploitation, the attacker downloads and executes an ARM32 binary payload, which is a variant of the Mirai malware. This variant incorporates advanced evasion techniques such as RC4 string encryption to obfuscate its code and communications, anti-virtual machine (VM) checks, and anti-emulation methods to avoid detection and analysis in sandboxed or virtualized environments. The malware also verifies that it is running in allowed directories before proceeding, which further complicates forensic analysis and detection. The primary objective of this botnet is to conscript vulnerable DVR devices into a large-scale distributed denial-of-service (DDoS) botnet, leveraging their network connectivity and processing power to overwhelm targeted systems or networks. The campaign has identified over 50,000 exposed TBK DVR devices as potentially vulnerable, with infections primarily reported in countries including China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Although the campaign is currently not reported to have active exploits in the wild beyond initial observations, the scale of vulnerable devices and the sophistication of the malware indicate a significant threat vector. The lack of available patches or firmware updates for these devices exacerbates the risk, making mitigation reliant on device resets and network-level protections. The technical sophistication of the malware, combined with the critical role of DVR devices in security infrastructure, underscores the importance of addressing this vulnerability promptly.
Potential Impact
For European organizations, the exploitation of CVE-2024-3721 in TBK DVR devices presents several risks. Many organizations, including enterprises, government agencies, and critical infrastructure operators, rely on DVRs for surveillance and security monitoring. Compromise of these devices can lead to unauthorized access to video feeds, loss of confidentiality, and potential manipulation or disruption of security monitoring. More critically, infected devices become part of a botnet used to launch DDoS attacks, which can degrade or disrupt network availability not only for the infected organization but also for external targets. This can result in service outages, reputational damage, and financial losses. Additionally, the presence of malware on security devices undermines trust in physical security systems and may complicate incident response efforts. The anti-VM and anti-emulation features of the malware make detection and analysis more difficult, potentially allowing infections to persist undetected for longer periods. Given the interconnected nature of IoT and security devices, lateral movement or further exploitation could be possible if attackers leverage these compromised DVRs as footholds. The medium severity rating reflects the combination of ease of exploitation (no authentication required), the scale of vulnerable devices, and the potential for significant operational disruption through DDoS activities.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should take several targeted actions beyond generic IoT security advice: 1) Conduct an immediate inventory of all TBK DVR devices within their networks to identify potentially vulnerable units. 2) Where possible, apply firmware updates or patches provided by the vendor; if no official patches exist, contact the vendor for guidance or consider device replacement. 3) Perform factory resets on affected devices to remove any persistent malware infections. 4) Segment DVR devices on isolated network segments with strict access controls to limit exposure and prevent lateral movement. 5) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) tuned to detect Mirai-related traffic patterns and anomalous POST requests targeting DVR devices. 6) Employ egress filtering to restrict unauthorized outbound connections from IoT devices, limiting botnet command and control communications. 7) Monitor network traffic for signs of DDoS activity originating from internal devices and establish incident response procedures for rapid containment. 8) Disable unnecessary services and change default credentials on all IoT and DVR devices to reduce attack surface. 9) Consider deploying honeypots or deception technologies to detect attempts to exploit this vulnerability. 10) Collaborate with national cybersecurity centers and ISACs to share threat intelligence and receive timely updates on emerging exploits.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/mirai-botnet-variant-targets-dvr-devices-with-cve-2024-3721/116742"]
- Adversary
- Mirai
- Pulse Id
- 6842e2da7eafc4bf38554913
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash011a406e89e603e93640b10325ebbdc8 | — | |
hash24fd043f9175680d0c061b28a2801dfc | — | |
hash29b83f0aae7ed38d27ea37d26f3c9117 | — | |
hash2e9920b21df472b4dd1e8db4863720bf | — | |
hash3120a5920f8ff70ec6c5a45d7bf2acc8 | — | |
hash3c2f6175894bee698c61c6ce76ff9674 | — | |
hash45a41ce9f4d8bb2592e8450a1de95dcc | — | |
hash524a57c8c595d9d4cd364612fe2f057c | — | |
hash6e7976666525a97639777d2d7f303177 | — | |
hash74dee23eaa98e2e8a7fc355f06a11d97 | — | |
hash761909a234ee4f1d856267abe30a3935 | — | |
hash7eb3d72fa7d730d3dbca4df34fe26274 | — | |
hash8a3e1176cb160fb42357fa3f46f0cbde | — | |
hash8d92e79b7940f0ac5b01bbb77737ca6c | — | |
hash95eaa3fa47a609ceefa24e8c7787bd99 | — | |
hash96ee8cc2edc8227a640cef77d4a24e83 | — | |
hashaaf34c27edfc3531cf1cf2f2e9a9c45b | — | |
hashba32f4eef7de6bae9507a63bde1a43aa | — | |
hash02a9b16a19a03e75d42d1c9c83fa4a5414ce26dc | — | |
hash05168a7a2816dc792d80f0a7c65b102b38e93bf1 | — | |
hash069a400624f2fcf69bca8a43fd52c05e95758927 | — | |
hash152b73f3e91eba572cbd8470a0f01adf363b7d64 | — | |
hash22b2333298b7cc9913c1eaf422dbe8830840d3e0 | — | |
hash2d877399e481a6ebded108631b55ff049c3316f4 | — | |
hash2e95bbf3069f603ae7ff882770f49dc36223a626 | — | |
hash46ee0aac6d64415146792c40a7f94989b5510107 | — | |
hash5160989ba4f8a75ef4e09dea0fda3bf7a2211fb7 | — | |
hash69adf42ea2216846631a85791b653b6ccbc45fb4 | — | |
hash6c4cbd259aa9d2a7f858ae607aa36da928f9268e | — | |
hash961c5cb9288292a58c3df007948dbb8e3602192d | — | |
hashc57a8ef11ec531eafd62dcb6c3ae558ea59bed08 | — | |
hashe77427eafc1ad985d83a37f68492318affaf466f | — | |
hashf836182a8a93db7985cdd67a5c1f5dbbf90bbe2a | — | |
hash1c39dbf66a362df572af7ad64164cc7d70a8875db68a710979d243760d8c027b | — | |
hash29754b61a1cce8c965bbc98efb125991b8b605dea9f3394c277092f30a109bdb | — | |
hash2a397594a3b009df342886a3480264a8773971559c79c8f95b1319eae77c55d6 | — | |
hash3bdbed482342487e08f5266e1a9b6478fcd0be645edcfb1e8c6dda1dac73cce9 | — | |
hash438dc2a85e37356eefd2d40ac7bafa8c3ad273dd36991d4b155208c3a3d460b5 | — | |
hash4abacef49032666c0d0b4a006368386bdc6c0367f6c5e21b022b650fb8dabdbc | — | |
hash52bd9e57f7db2716d2ec570bc9a5de9ba96bc620edb3ac9469b5b131b004a030 | — | |
hash7461c0f8feac69a39586c4c1ecfeb32627c5a83043721ba0144479efc0f036a1 | — | |
hash86ef39910b9361f012f889146e16b2e279a07465fe3e2f9b493ef0534a5c66c0 | — | |
hash9ae1955b9de5e4e6b23e55d2aab3230ff3a6b5c723d77a6653b2145719dc2eb6 | — | |
hashb2be07ed781bcdef614cd7c1461d81bfd8df2bc7eb11b6bfb5b202af881d727c | — | |
hashdd2c66661d94f007d87754dcbc1ace9f228785676632a39fef2ce0e26d54e206 | — | |
hashdd54e4a0220b6afbe0dbee66e32af3fe2012cc37023044a683e8e0c98579a059 | — | |
hashe5f9a505082501b32d442a3fa6a9fb40a48b7da91a5a0efc5677bed5401e0c2b | — | |
hashf3989e7cca7d17c909c5f53945c7846d2d269d32113042bf535285c4d75624e6 | — |
Ip
Value | Description | Copy |
---|---|---|
ip42.112.26.36 | — | |
ip63.231.92.27 | — |
Threat ID: 684585c571f4d251b54eaf44
Added to database: 6/8/2025, 12:44:53 PM
Last enriched: 7/9/2025, 12:27:07 AM
Last updated: 8/4/2025, 10:15:06 AM
Views: 16
Related Threats
Fake Tesla Websites Scams
MediumNorth Korean Group ScarCruft Expands From Spying to Ransomware Attacks
MediumMedusaLocker ransomware group is looking for pentesters
MediumNew Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
HighThreatFox IOCs for 2025-08-10
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.