Mirai Botnet Variants Target TBK DVRs via CVE-2024-3721
Mirai botnet variants, including Nexcorium, are actively exploiting a command injection vulnerability (CVE-2024-3721) in TBK DVR devices. This flaw, rated medium severity, allows attackers to hijack these devices and integrate them into a DDoS botnet. The attacks also impact end-of-life TP-Link Wi-Fi routers, highlighting the ongoing risks associated with unpatched and unsupported IoT hardware.
This exploitation underscores a persistent problem: legacy and unsupported devices remain prime targets for botnet operators. Defenders must prioritize identifying and isolating these vulnerable endpoints. The calculus for attackers is simple: these devices are often unmonitored and unpatched, offering a low-risk, high-reward entry point for expanding their attack infrastructure.
What This Means For You
- If your organization utilizes TBK DVRs or end-of-life TP-Link routers, immediately audit your network for these devices. Isolate any identified devices and disconnect them from the internet. Prioritize patching or replacement of all end-of-life networking equipment and IoT devices to mitigate this command injection risk.
Related ATT&CK Techniques
๐ก๏ธ Detection Rules
1 rule ยท 6 SIEM formats1 detection rule mapped to MITRE ATT&CK. Sigma YAML is free โ copy below.
Mirai Variant Command Injection via TBK DVR CVE-2024-3721
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2024-3721 | Vulnerability | CVE-2024-3721 |