Mirai Mayhem: Unpatched Vulnerability Nightmare for DigiEver NVRs and TP-Link Routers

In a plot twist worthy of a tech thriller, a new Mirai-based botnet is exploiting a remote code execution vulnerability in DigiEver NVRs. The botnet targets outdated firmware, turning innocuous gadgets into unwitting cyber warriors. Lock your routers, folks; this is not the kind of botnet you want crashing your Wi-Fi party!

Pro Dashboard

Hot Take:

Ah, the Mirai botnet: the gift that keeps on giving (hackers a field day, that is). It’s like a bad sequel that no one asked for, yet here it is, back again, exploiting vulnerabilities like it’s 2016. And just like your favorite soap opera, this one’s got it all: unpatched exploits, remote code execution, and a plot twist involving outdated TP-Link routers. Popcorn, anyone?

Key Points:

  • New Mirai-based botnet targets unpatched DigiEver DS-2105 Pro NVRs.
  • This campaign has been running since September, exploiting outdated network video recorders and routers.
  • Vulnerabilities used include CVE-2023-1389 on TP-Link devices and CVE-2018-17532 on Teltonika routers.
  • Botnet employs sophisticated encryption techniques like XOR and ChaCha20.
  • Akamai provides Indicators of Compromise (IoC) and Yara rules for detection.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?