CyberSecurity SEE

Nexcorium Mirai Variant Exploits TBK DVR Vulnerability in New IoT Botnet Campaign

Nexcorium Mirai Variant Exploits TBK DVR Vulnerability in New IoT Botnet Campaign

Nexcorium Malware Variant Emerges, Targeting Unpatched IoT Devices

A newly identified variant of Mirai malware, dubbed Nexcorium, is actively exploiting vulnerabilities in unpatched Internet of Things (IoT) devices, raising alarms in cybersecurity communities. Recent threat research from FortiGuard Labs highlights that attackers are leveraging a critical vulnerability found in TBK DVR systems to orchestrate a massive botnet, capable of executing devastating distributed denial-of-service (DDoS) attacks.

The primary focus of this campaign is the CVE-2024-3721, a severe operating system command injection flaw that affects specific models of TBK DVRs, namely the DVR-4104 and DVR-4216. Cybercriminals exploit this vulnerability to bypass existing security measures, delivering a malicious downloader script that enables further intrusion.

FortiGuard Labs’ analysis unveiled a distinctive feature within the attack traffic: a custom HTTP header reading “X-Hacked-By: Nexus Team – Exploited By Erratic.” This unique identifier suggests a strong connection between the malicious activities and an emerging threat actor known as the Nexus Team.

Malware Behavior and Rapid Spread

Once the initial downloader script is executed, it retrieves the Nexcorium payload. This malware boasts a remarkable adaptability, enabling it to infect various Linux device architectures, including ARM, MIPS, and x86-64. Upon a successful execution, the malware displays an ominous system message: “nexuscorp has taken control.”

Functioning similarly to traditional Mirai botnets, Nexcorium enhances its spreading techniques aggressively. After successfully infecting a host device, the malware scans the internet for other vulnerable targets. Additionally, it includes an exploit aimed specifically at hijacking Huawei HG532 routers (CVE-2017-17215) and employs a hard-coded dictionary of commonly used weak passwords, such as “admin,” “12345,” and “guest,” to brute-force access to other exposed devices via Telnet connections.

Persistence Mechanisms

In order to maintain its foothold, Nexcorium utilizes a multi-layered approach to ensure persistence. The malware embeds itself deeply within system directories and implements multiple backup mechanisms:

To conceal its presence from security analysts and antivirus measures, Nexcorium deletes its original installation files after securing its persistent foothold.

Objectives and Attack Methods

The ultimate objective of the Nexcorium botnet is to initiate catastrophic DDoS attacks. The malware establishes communication with a remote command-and-control server, which issues targeting directives. FortiGuard Labs has reported that Nexcorium is exceptionally versatile, supporting various attack methods, including UDP floods, TCP SYN floods, and SMTP floods. This versatility enables the Nexus Team to overwhelm a range of networks, applications, and web servers.

Mitigation Strategies

As IoT botnets like Nexcorium continue to proliferate, it is crucial for organizations and network administrators to adopt proactive defensive measures. Recommendations include:

In conclusion, with the emergence of the Nexcorium malware variant, vigilance and immediate action are critical in protecting against potential threats targeted at IoT devices. Organizations must remain proactive in addressing vulnerabilities and securing their networks to mitigate the risks posed by evolving threats in the cybersecurity landscape.

Source link

Exit mobile version