Skip to main content

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

Medium
Published: Fri Jun 06 2025 (06/06/2025, 12:45:14 UTC)
Source: AlienVault OTX General

Description

A new wave of Mirai botnet attacks is exploiting CVE-2024-3721 to target TBK DVR devices. The campaign uses a POST request to execute system commands without authorization, downloading and running an ARM32 binary. This Mirai variant includes features like RC4 string encryption, anti-VM checks, and anti-emulation techniques. The malware verifies if it's running in a virtual environment and checks for allowed directories. Infected devices are primarily located in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Over 50,000 exposed DVR devices are potentially vulnerable. The botnet's main goal is to conduct DDoS attacks. Updating vulnerable devices and performing factory resets are recommended as protective measures.

AI-Powered Analysis

AILast updated: 07/09/2025, 00:27:07 UTC

Technical Analysis

The threat described involves a new wave of attacks by a Mirai botnet variant exploiting a recently disclosed vulnerability identified as CVE-2024-3721. This vulnerability affects TBK brand Digital Video Recorder (DVR) devices, which are commonly used in surveillance and security camera systems. The exploitation method involves sending a specially crafted POST request that allows unauthenticated attackers to execute arbitrary system commands on the targeted device. Upon successful exploitation, the attacker downloads and executes an ARM32 binary payload, which is a variant of the Mirai malware. This variant incorporates advanced evasion techniques such as RC4 string encryption to obfuscate its code and communications, anti-virtual machine (VM) checks, and anti-emulation methods to avoid detection and analysis in sandboxed or virtualized environments. The malware also verifies that it is running in allowed directories before proceeding, which further complicates forensic analysis and detection. The primary objective of this botnet is to conscript vulnerable DVR devices into a large-scale distributed denial-of-service (DDoS) botnet, leveraging their network connectivity and processing power to overwhelm targeted systems or networks. The campaign has identified over 50,000 exposed TBK DVR devices as potentially vulnerable, with infections primarily reported in countries including China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. Although the campaign is currently not reported to have active exploits in the wild beyond initial observations, the scale of vulnerable devices and the sophistication of the malware indicate a significant threat vector. The lack of available patches or firmware updates for these devices exacerbates the risk, making mitigation reliant on device resets and network-level protections. The technical sophistication of the malware, combined with the critical role of DVR devices in security infrastructure, underscores the importance of addressing this vulnerability promptly.

Potential Impact

For European organizations, the exploitation of CVE-2024-3721 in TBK DVR devices presents several risks. Many organizations, including enterprises, government agencies, and critical infrastructure operators, rely on DVRs for surveillance and security monitoring. Compromise of these devices can lead to unauthorized access to video feeds, loss of confidentiality, and potential manipulation or disruption of security monitoring. More critically, infected devices become part of a botnet used to launch DDoS attacks, which can degrade or disrupt network availability not only for the infected organization but also for external targets. This can result in service outages, reputational damage, and financial losses. Additionally, the presence of malware on security devices undermines trust in physical security systems and may complicate incident response efforts. The anti-VM and anti-emulation features of the malware make detection and analysis more difficult, potentially allowing infections to persist undetected for longer periods. Given the interconnected nature of IoT and security devices, lateral movement or further exploitation could be possible if attackers leverage these compromised DVRs as footholds. The medium severity rating reflects the combination of ease of exploitation (no authentication required), the scale of vulnerable devices, and the potential for significant operational disruption through DDoS activities.

Mitigation Recommendations

To mitigate this threat effectively, European organizations should take several targeted actions beyond generic IoT security advice: 1) Conduct an immediate inventory of all TBK DVR devices within their networks to identify potentially vulnerable units. 2) Where possible, apply firmware updates or patches provided by the vendor; if no official patches exist, contact the vendor for guidance or consider device replacement. 3) Perform factory resets on affected devices to remove any persistent malware infections. 4) Segment DVR devices on isolated network segments with strict access controls to limit exposure and prevent lateral movement. 5) Implement network-level protections such as intrusion detection/prevention systems (IDS/IPS) tuned to detect Mirai-related traffic patterns and anomalous POST requests targeting DVR devices. 6) Employ egress filtering to restrict unauthorized outbound connections from IoT devices, limiting botnet command and control communications. 7) Monitor network traffic for signs of DDoS activity originating from internal devices and establish incident response procedures for rapid containment. 8) Disable unnecessary services and change default credentials on all IoT and DVR devices to reduce attack surface. 9) Consider deploying honeypots or deception technologies to detect attempts to exploit this vulnerability. 10) Collaborate with national cybersecurity centers and ISACs to share threat intelligence and receive timely updates on emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/mirai-botnet-variant-targets-dvr-devices-with-cve-2024-3721/116742"]
Adversary
Mirai
Pulse Id
6842e2da7eafc4bf38554913
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash011a406e89e603e93640b10325ebbdc8
hash24fd043f9175680d0c061b28a2801dfc
hash29b83f0aae7ed38d27ea37d26f3c9117
hash2e9920b21df472b4dd1e8db4863720bf
hash3120a5920f8ff70ec6c5a45d7bf2acc8
hash3c2f6175894bee698c61c6ce76ff9674
hash45a41ce9f4d8bb2592e8450a1de95dcc
hash524a57c8c595d9d4cd364612fe2f057c
hash6e7976666525a97639777d2d7f303177
hash74dee23eaa98e2e8a7fc355f06a11d97
hash761909a234ee4f1d856267abe30a3935
hash7eb3d72fa7d730d3dbca4df34fe26274
hash8a3e1176cb160fb42357fa3f46f0cbde
hash8d92e79b7940f0ac5b01bbb77737ca6c
hash95eaa3fa47a609ceefa24e8c7787bd99
hash96ee8cc2edc8227a640cef77d4a24e83
hashaaf34c27edfc3531cf1cf2f2e9a9c45b
hashba32f4eef7de6bae9507a63bde1a43aa
hash02a9b16a19a03e75d42d1c9c83fa4a5414ce26dc
hash05168a7a2816dc792d80f0a7c65b102b38e93bf1
hash069a400624f2fcf69bca8a43fd52c05e95758927
hash152b73f3e91eba572cbd8470a0f01adf363b7d64
hash22b2333298b7cc9913c1eaf422dbe8830840d3e0
hash2d877399e481a6ebded108631b55ff049c3316f4
hash2e95bbf3069f603ae7ff882770f49dc36223a626
hash46ee0aac6d64415146792c40a7f94989b5510107
hash5160989ba4f8a75ef4e09dea0fda3bf7a2211fb7
hash69adf42ea2216846631a85791b653b6ccbc45fb4
hash6c4cbd259aa9d2a7f858ae607aa36da928f9268e
hash961c5cb9288292a58c3df007948dbb8e3602192d
hashc57a8ef11ec531eafd62dcb6c3ae558ea59bed08
hashe77427eafc1ad985d83a37f68492318affaf466f
hashf836182a8a93db7985cdd67a5c1f5dbbf90bbe2a
hash1c39dbf66a362df572af7ad64164cc7d70a8875db68a710979d243760d8c027b
hash29754b61a1cce8c965bbc98efb125991b8b605dea9f3394c277092f30a109bdb
hash2a397594a3b009df342886a3480264a8773971559c79c8f95b1319eae77c55d6
hash3bdbed482342487e08f5266e1a9b6478fcd0be645edcfb1e8c6dda1dac73cce9
hash438dc2a85e37356eefd2d40ac7bafa8c3ad273dd36991d4b155208c3a3d460b5
hash4abacef49032666c0d0b4a006368386bdc6c0367f6c5e21b022b650fb8dabdbc
hash52bd9e57f7db2716d2ec570bc9a5de9ba96bc620edb3ac9469b5b131b004a030
hash7461c0f8feac69a39586c4c1ecfeb32627c5a83043721ba0144479efc0f036a1
hash86ef39910b9361f012f889146e16b2e279a07465fe3e2f9b493ef0534a5c66c0
hash9ae1955b9de5e4e6b23e55d2aab3230ff3a6b5c723d77a6653b2145719dc2eb6
hashb2be07ed781bcdef614cd7c1461d81bfd8df2bc7eb11b6bfb5b202af881d727c
hashdd2c66661d94f007d87754dcbc1ace9f228785676632a39fef2ce0e26d54e206
hashdd54e4a0220b6afbe0dbee66e32af3fe2012cc37023044a683e8e0c98579a059
hashe5f9a505082501b32d442a3fa6a9fb40a48b7da91a5a0efc5677bed5401e0c2b
hashf3989e7cca7d17c909c5f53945c7846d2d269d32113042bf535285c4d75624e6

Ip

ValueDescriptionCopy
ip42.112.26.36
ip63.231.92.27

Threat ID: 684585c571f4d251b54eaf44

Added to database: 6/8/2025, 12:44:53 PM

Last enriched: 7/9/2025, 12:27:07 AM

Last updated: 8/4/2025, 10:15:06 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats