Security researchers have recently uncovered a new wave of cyberattacks targeting TBK DVR devices through the exploitation of a critical vulnerability known as CVE-2024-3721.
This campaign is being conducted by a variant of the infamous Mirai botnet, which has been adapted and repurposed by cybercriminal groups for years.
Upon analyzing logs from Linux honeypot systems, experts observed unusual requests specifically crafted to abuse this vulnerability.
The attack begins when a threat actor sends a specially constructed POST request to vulnerable DVRs, exploiting a flaw that allows unauthorized remote code execution.
This method is effective because TBK DVR devices, commonly used for surveillance and remote monitoring, often remain exposed to the internet and are not always promptly updated with security patches.
The malicious POST request carries a payload designed to execute a shell script directly on the target device.
The script downloads an ARM32 binary from a remote server and executes it, providing the attacker with complete control over the infected system.
Unlike previous Mirai variants that perform initial reconnaissance to determine the system architecture, this new variant specifically targets TBK DVRs known to run on ARM32 processors.
This targeting streamlines the attack process, allowing the botnet to spread more rapidly among unpatched devices.
Once executed, the malware proceeds to integrate the compromised device into the botnet, ready to receive further commands from its operator.
Advanced Techniques And Evasion Measures
This Mirai variant introduces several advanced techniques aimed at evading detection and analysis.
One notable feature is the use of RC4 encryption to obfuscate critical strings within the malware, making it more difficult for security researchers to analyze its behavior.

The RC4 key itself is obfuscated using XOR encryption, and after decryption, the actual key is used to decode strings stored in the malware.
The decrypted strings, which include commands and communication endpoints, are stored in a custom data structure within the malware for quick access during operations.
This approach not only complicates reverse engineering but also allows the botnet to adapt its command-and-control infrastructure dynamically.
- Another layer of defense employed by this malware is anti-virtualization and anti-emulation checks.
- The bot checks the environment in which it is running to determine if it is being analyzed within a virtual machine or emulator.
- It does this by scanning the process list for known virtualization tools such as VMware or QEMU-arm.
- If it detects signs of analysis, it terminates execution or behaves erratically to avoid revealing its true capabilities.
- Additionally, the malware verifies that it is running from a set of predetermined directories, further reducing the likelihood of detection by automated analysis tools.
- These evasion tactics make it more challenging for security researchers to study the malware and develop effective countermeasures.
Global Impact And Response
The infection campaign has already affected a significant number of devices across multiple countries, with the highest concentrations reported in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.
Publicly available data suggests that more than 50,000 TBK DVR devices are exposed to the internet, offering a vast attack surface for cybercriminals to exploit.
The true scale of the infection may be even larger, given the challenges in accurately tracking vulnerable and compromised devices globally.

To protect against this and similar threats, it is crucial for organizations and individuals to update vulnerable devices as soon as security patches become available.
Patching the CVE-2024-3721 vulnerability should be the first line of defense.
Additional recommendations include implementing network segmentation for IoT devices, restricting inbound access to sensitive services, and monitoring network traffic for signs of compromise.
In cases where a device is suspected to be infected, a factory reset may be necessary to remove the malware, though this should be combined with firmware updates to prevent reinfection.
Security solutions from leading vendors, such as Kaspersky, are capable of detecting this Mirai variant as HEUR:Backdoor.Linux.Mirai and HEUR:Backdoor.Linux.Gafgyt. Indicators of compromise include specific MD5 hashes of the malware binaries and a list of command-and-control server IP addresses.
By remaining vigilant and proactive, organizations can reduce their risk of falling victim to this and other evolving botnet threats.
The ongoing abuse of known security flaws in IoT devices highlights the importance of maintaining robust security practices and staying informed about emerging threats.





