New Mirai-based Nexcorium Malware Hijacks Security Cameras for DDoS Attacks

New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks

Cybersecurity researchers at Fortinet have discovered Nexcorium, a new Mirai-based malware targeting TBK DVR systems to turn them into a botnet for DDoS attacks.

Cybersecurity researchers at Fortinet’s FortiGuard Labs have found a new malware that is taking over smart devices across the globe. This threat, named Nexcorium, is a new version of the infamous Mirai malware. It is built to create a botnet, which is a large network of infected IoT devices and gadgets controlled by hackers to carry out large-scale DDoS attacks.

How the hackers gain access

FortiGuard Lab’s security analysts have found that in this campaign, the key targets of hackers are video recording boxes used for security cameras, preferably the TBK DVR-4104 and DVR-4216 models. That’s probably because these devices are rarely updated and have weak security settings, hence being easier to compromise.

According to researchers, attackers are abusing CVE-2024-3721, a command injection vulnerability in these specific devices, allowing hackers to gain access and run malicious code and gain persistent remote access.

Upon successful compromise, it leads to the showing of a message on the system saying “NexusCorp has taken control.” This gives away the attackers’ identity, which, according to researchers, is the Nexus Team. They even leave a signature in the code that says “Nexus Team – Exploited By Erratic,” thus validating this attribution.

Malware Capabilities

In their blog post shared with Hackread.com ahead of publishing on Friday, Vincent Li of FortiGuard Labs noted that Nexcorium is a “multi-architecture” malware, which means it can work on different processors.

The malware is also difficult to get rid of because it copies itself into several different folders. It then sets up automatic tasks so that if the device is turned off and on again, the malware just starts back up, and even deletes its own original files to hide from anyone trying to find it.

To extend the botnet network, the malware tries to compromise other smart devices in the same building. For this purpose, it uses a built-in, long list of basic passwords like “admin123, 12345, and guest.” Additionally, by using brute force, Nexcorium keeps trying these passwords one by one to see if it can log into other routers or cameras.

ubuntuguestsupportdefault
12345123456changemehikvision
operator888888Administratormeinsm
7ujMko0adminadmin123admin1234admintest
comcomcommotorolapassworddaemon
OxhlwSG8S2fGqNFstlJwpbo6D-Link
netscreen7ujMko0vizxvGM8182Root1
Zte521antslqcat1029dreambox
grouterhg2x0huigu309ipcam_rt5350
jauntechsolokeyswsbzkgntaZz@23495859
tsgoingonvertex25ektks123xc3511xmhdipc
Zhongxingtelnettelnetadmin
List of hardcoded passwords used for Brute Forcing (Credit: Fortinet)

DDoS Attacks

The main purpose of this entire exercise is to launch Distributed Denial of Services (DDoS) attacks in which thousands of infected devices flood a website with so much fake traffic that it crashes and stops working.

Researchers noted that Nexcorium malware displays “typical traits of modern IoT-focused botnets, combining vulnerability exploitation, support for multiple architectures, and various persistence methods to sustain long-term access to infected systems. Its use of known exploits, such as CVE-2017-17215, along with extensive brute-force capabilities, underscores its adaptability and efficacy in increasing its infection reach.”

Since Nexcorium can run on many different types of hardware, it is a high-level threat to any organisation using these recording boxes. Therefore, changing default passwords and keeping software updated is the best way to stay safe.

“The Nexcorium campaign is a precise illustration of why automated scanning alone cannot close the exposure gap. Machine speed analysis tells you a vulnerability exists, but a human researcher’s depth tells you how an adversary will chain it, weaponize it, and sustain access long after the initial alert fires,” said Trey Ford, Chief Strategy and Trust Officer at Bugcrowd, a San Francisco, Calif.-based crowdsourced cybersecurity.

“What organizations need is continuous adversarial testing that mirrors actual attacker behavior across the full asset inventory, including the devices that security teams have quietly placed out of scope,” he advised. “While classically true of professional attackers, the next generation of security defense programs will be defined by how aggressively they test the edges, not just the crown jewels.”

Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage.
Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts