Mirai Malware Strikes Again: DVRs Hijacked for Botnet Mischief!
A new Mirai malware variant is exploiting a vulnerability in TBK DVRs, tracked under CVE-2024-3721, to hijack devices. The flaw, disclosed by security researcher netsecfish, allows attackers to add DVRs to their botnet army. As of now, the patch status from TBK Vision remains as mysterious as Bigfoot’s hair care routine.

Hot Take:
The Mirai botnet is back at it again, proving that even your grandma’s DVR might secretly be moonlighting in a cybercriminal’s botnet army. With more rebrands than a pop star and vulnerabilities that are easier to exploit than your cat’s desire for treats, these DVRs are living their best double lives. Who knew your security camera could be a secret agent for chaos?
Key Points:
- A new variant of the Mirai malware is exploiting a command injection vulnerability in TBK DVRs.
- The vulnerability, CVE-2024-3721, was disclosed in April 2024 and is actively being exploited.
- The botnet targets devices in countries like China, India, and Brazil, among others.
- It’s unclear if TBK Vision has released patches for the vulnerability.
- The TBK DVRs are rebranded under various names, complicating patch availability.
Already a member? Log in here