Cydome researchers have identified a new Mirai botnet variant dubbed Broadside that is targeting the maritime logistics sector by exploiting the command injection vulnerability CVE-2024-3721 in TBK DVR devices used on vessels.
“Cydome’s Cybersecurity Research Team has identified an active campaign of a new variant of the Mirai botnet, designated as “Broadside”.” reads the report published by Cydome. “This campaign was found to target the maritime logistics sector, exploiting a vulnerability (CVE-2024-3721) in TBK DVR (Digital Video Recorders) devices in use by shipping companies on vessels (among others).”
The flaw was disclosed in April 2024 with PoC code available, and it has been widely exploited by multiple DDoS botnets by mid-2025.
The Mirai botnet’s source code, made public nearly a decade ago, has since been widely reused and modified by cybercriminals to power large-scale botnets.
Cydome observed that the campaign’s infrastructure has been tracked for months, showing fluctuating activity. Broadside differs from typical Mirai through a custom C2 protocol, a unique Magic Header, and a “Judge, Jury, and Executioner” exclusivity module. The bot uses Netlink kernel sockets for stealthy monitoring and payload polymorphism to evade detection.
The Broadside botnet is using a mass loader that executes multi-architecture payloads in memory and wipes traces. Like other Mirai variants, it supports UDP-based DDoS attacks, however, beyond DDoS, it also steals /etc/passwd and /etc/shadow, enabling privilege escalation and lateral movement.
Broadside also includes a process-killer module that maintains control by terminating suspicious or hostile processes.
The researchers warn that TBK DVR flaw also impacts rebranded models sold as CeNova, Night Owl, QSee, and others.
Cydome warns the campaign poses serious risks to shipping firms, as the targeted DVRs are often installed on vessels. Compromised devices could enable access to CCTV feeds of the bridge, cargo areas, or engine room, disrupt satellite communications through flooding, or provide a foothold for lateral movement toward critical OT systems on the ship.
“Crucially, the threat extends beyond denial-of-service attacks; analysis confirms that Broadside actively attempts to harvest system credential files (/etc/passwd and /etc/shadow).” concludes the report. “This indicates a secondary objective of privilege escalation and lateral movement, transforming the compromised device from a simple bot into a strategic foothold.”
In June, researchers from Russian cybersecurity firm Kaspersky discovered another variant of the Mirai botnet that exploits a command injection vulnerability (CVE-2024-3721) in TBK DVR-4104 and DVR-4216 digital video recording devices. During a review of the logs in their Linux honeypot system, the researchers noticed a suspect POST request linked to the potential exploitation of CVE-2024-3721.
This Mirai variant uses a simple RC4 algorithm to decrypt strings and uses XOR to obfuscate the key. Once decrypted, strings are stored in a global list for use during execution. The malware also includes anti-VM and anti-emulation checks by scanning running processes for signs of VMware or QEMU.
The malware also verifies its execution path against a list of allowed directories to avoid detection. If all checks pass, it proceeds to prepare the infected device to receive commands.
Most infections are in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil. While the exact number of infected devices is unclear, Kaspersky found over 50,000 exposed DVRs, which are potential targets.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Broadside botnet)