Mirai Mayhem: Unpatched Vulnerability Nightmare for DigiEver NVRs and TP-Link Routers
In a plot twist worthy of a tech thriller, a new Mirai-based botnet is exploiting a remote code execution vulnerability in DigiEver NVRs. The botnet targets outdated firmware, turning innocuous gadgets into unwitting cyber warriors. Lock your routers, folks; this is not the kind of botnet you want crashing your Wi-Fi party!

Hot Take:
Ah, the Mirai botnet: the gift that keeps on giving (hackers a field day, that is). It’s like a bad sequel that no one asked for, yet here it is, back again, exploiting vulnerabilities like it’s 2016. And just like your favorite soap opera, this one’s got it all: unpatched exploits, remote code execution, and a plot twist involving outdated TP-Link routers. Popcorn, anyone?
Key Points:
- New Mirai-based botnet targets unpatched DigiEver DS-2105 Pro NVRs.
- This campaign has been running since September, exploiting outdated network video recorders and routers.
- Vulnerabilities used include CVE-2023-1389 on TP-Link devices and CVE-2018-17532 on Teltonika routers.
- Botnet employs sophisticated encryption techniques like XOR and ChaCha20.
- Akamai provides Indicators of Compromise (IoC) and Yara rules for detection.
Already a member? Log in here