A new Linux/IoT botnet named “Amnesia” has been targeting digital video recorders (DVRs) by exploiting an unpatched remote code execution vulnerability disclosed more than one year ago.
The threat, believed to be a variant of the Tsunami botnet, has been analyzed in detail by researchers at Palo Alto Networks. The botnet targets embedded systems, particularly DVRs made by China-based TVT Digital, which are sold under more than 70 brands worldwide.
The vulnerability exploited by the Amnesia malware was disclosed in March 2016 by researcher Rotem Kerner. The expert decided to make his findings public after the vendor ignored his attempts to report the flaw.
The security hole likely remains unpatched and an Internet scan conducted by Palo Alto Networks shows that there are roughly 227,000 vulnerable DVRs in the United States, Taiwan, India, Israel, Turkey, Malaysia and many other countries. A different search carried out via the Censys.io project revealed more than 700,000 IP addresses.
Amnesia has exploited the remote code execution flaw to identify vulnerable DVRs and take complete control of the devices.
Several IoT botnets emerged over the past months, including the notorious Mirai and Remaiten, which also includes capabilities borrowed from Tsunami.
What makes Amnesia interesting is the fact that it has virtual machine (VM) evasion capabilities – experts say this is the first Linux malware that attempts to evade sandboxes.
It’s not uncommon for Windows and Android malware to evade VMs, but such evasion techniques have not been seen in Linux malware.
“Amnesia tries to detect whether it’s running in a VirtualBox, VMware or QEMU based virtual machine, and if it detects those environments it will wipe the virtualized Linux system by deleting all the files in file system,” explained Palo Alto Networks researchers. “This affects not only Linux malware analysis sandboxes but also some QEMU based Linux servers on VPS or on public cloud.”
While Amnesia has yet to be used for large-scale attacks, experts believe it does have the potential to become a major botnet that can cause significant damage.
Related: IoT Botnets Fuel DDoS Attacks Growth
Related: DDoS-Capable IRCTelnet IoT Botnet Emerges
Related: Hundreds of Thousands of IP Cameras Exposed to IoT Botnets

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- CISA Releases Open Source Recovery Tool for ESXiArgs Ransomware
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
Latest News
- Skybox Security Raises $50M, Hires New CEO
- Spies, Hackers, Informants: How China Snoops on the US
- Australian Man Sentenced for Scam Related to Optus Hack
- Chrome 110 Patches 15 Vulnerabilities
- Application Security Protection for the Masses
- Tor Network Under DDoS Pressure for 7 Months
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- UN Experts: North Korean Hackers Stole Record Virtual Assets
