Mirai Broadside Botnet Targets Maritime IoT with Advanced Tactics
Summary
Hide ▲
Show ▼
A new Mirai botnet variant, Broadside, is exploiting a critical-severity vulnerability (CVE-2024-3721) in TBK DVR to target the maritime logistics sector. Unlike previous Mirai variants, Broadside employs a custom C2 protocol, a unique 'Magic Header' signature, and an advanced 'Judge, Jury, and Executioner' module for exclusivity. It uses Netlink kernel sockets for stealthy, event-driven process monitoring and payload polymorphism to evade static defenses. Broadside attempts to maintain exclusive control over hosts by terminating other processes and harvesting system credential files to establish a strategic foothold. The botnet extends beyond denial-of-service attacks, aiming to compromise devices within the maritime sector, which could have significant operational and security implications.
Timeline
-
11.12.2025 15:40 1 articles · 23h ago
Broadside Mirai Variant Exploits TBK DVR Vulnerability in Maritime Sector
A new Mirai botnet variant, Broadside, has been observed exploiting a critical-severity vulnerability (CVE-2024-3721) in TBK DVR to target the maritime logistics sector. Unlike previous variants, Broadside employs advanced tactics such as a custom C2 protocol, a unique 'Magic Header' signature, and an advanced module for exclusivity. It uses Netlink kernel sockets for stealthy monitoring and payload polymorphism to evade detection. The botnet also attempts to harvest system credential files to establish a strategic foothold.
Show sources
- ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories — thehackernews.com — 11.12.2025 15:40
Information Snippets
-
Broadside exploits CVE-2024-3721 in TBK DVR to target maritime logistics.
First reported: 11.12.2025 15:401 source, 1 articleShow sources
- ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories — thehackernews.com — 11.12.2025 15:40
-
Broadside uses a custom C2 protocol, 'Magic Header' signature, and 'Judge, Jury, and Executioner' module.
First reported: 11.12.2025 15:401 source, 1 articleShow sources
- ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories — thehackernews.com — 11.12.2025 15:40
-
The botnet employs Netlink kernel sockets for stealthy, event-driven process monitoring.
First reported: 11.12.2025 15:401 source, 1 articleShow sources
- ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories — thehackernews.com — 11.12.2025 15:40
-
Broadside attempts to terminate other processes and harvest system credential files.
First reported: 11.12.2025 15:401 source, 1 articleShow sources
- ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories — thehackernews.com — 11.12.2025 15:40
-
The botnet extends beyond denial-of-service attacks to establish a strategic foothold.
First reported: 11.12.2025 15:401 source, 1 articleShow sources
- ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories — thehackernews.com — 11.12.2025 15:40