CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Nexcorium Mirai variant leverages CVE-2024-3721 to compromise TBK DVRs and expand DDoS botnet operations

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A Mirai variant named Nexcorium is being actively deployed via CVE-2024-3721, a command injection vulnerability affecting TBK DVR-4104 and DVR-4216 devices, to establish a DDoS botnet. The malware exploits the flaw to drop a downloader that executes architecture-specific payloads, displays a message indicating takeover by "nexuscorp," and leverages hard-coded credentials for lateral movement via Telnet. Persistence is achieved through crontab and systemd services, with command-and-control (C2) communication awaiting DDoS attack instructions. The malware also includes an exploit for CVE-2017-17215 to target Huawei HG532 devices and deletes original binaries to hinder forensic analysis.

Timeline

  1. 18.04.2026 09:01 1 articles · 23h ago

    Active exploitation of CVE-2024-3721 to deploy Nexcorium Mirai variant on TBK DVRs

    Nexcorium malware is being delivered to TBK DVR-4104 and DVR-4216 devices via CVE-2024-3721, a command injection flaw. The malware establishes persistence through crontab and systemd services, uses hard-coded credentials for Telnet-based lateral movement, and awaits C2 commands to initiate multi-protocol DDoS attacks after deleting original binaries to hinder analysis.

    Show sources

Information Snippets