New Mirai botnet behind surge in TVT DVR exploitation

by CybrGPT
0 comment

A significant spike in exploitation attempts targeting TVT NVMS9000 DVRs has been detected, peaking on April 3, 2025, with over 2,500 unique IPs scanning for vulnerable devices.

The attacks attempt to exploit an information disclosure vulnerability first disclosed by an SSD Advisory in May 2024, which published the full exploitation details on retrieving admin credentials in cleartext using a single TCP payload.

The exploitation results in an authentication bypass, allowing attackers to execute administrative commands on the device without restriction.

According to the threat monitoring platform GreyNoise, which detected the exploitation activity, it’s likely tied to a Mirai-based malware that seeks to incorporate the devices into its botnet.

Typically, infected devices are then used to proxy malicious traffic, cryptomining, or launch distributed denial of service (DDoS) attacks.

In the past month, GreyNoise logged 6,600 distinct IPs associated with this activity, with all of them confirmed to be malicious and non-spoofable.

Most of the attacks originate from Taiwan, Japan, and South Korea, while the majority of the targeted devices are based in the U.S., the U.K., and Germany.

Spike in exploitation attempts
Spike in exploitation attempts
Source: GreyNoise

The TVT NVMS9000 DVR is a digital video recorder made by the Shenzen-based TVT Digital Technology Co., Ltd.

These DVRs are used primarily in security and surveillance systems to record, store, and manage video footage from security cameras.

As DVRs are commonly internet-connected, they have been historically targeted by various botnets, with some even leveraging five-year-old flaws.

Some recent examples of botnets targeting exposed DVRs include HiatusRAT, Mirai, and FreakOut.

According to SSD’s advisory, customers should upgrade to firmware version 1.3.4 or later to fix the flaw.

If upgrading is impossible, it is recommended that public internet access to DVR ports be restricted and that incoming requests from the IP addresses listed by GreyNoise be blocked.

Signs of Mirai infections on DVRs include outbound traffic spikes, sluggish performance, frequent crashes or reboots, high CPU/memory usage even when idle, and altered configurations.

If any of those are spotted, disconnect the DVR, perform a factory reset, update to the latest firmware, and then isolate it from the main network.

The last firmware release for the NVMS9000 was in 2018, so it is unclear if the devices are still supported. 

Red Report 2025

Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Source link

You may also like

Leave a Comment

Stay informed with the latest in cybersecurity news. Explore updates on malware, ransomware, data breaches, and online threats. Your trusted source for digital safety and cyber defense insights.

BuyBitcoinFiveMinute

Subscribe my Newsletter for new blog posts, tips & new photos. Let’s stay updated!

© 2025 cybrgpt.com – All rights reserved.