Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

The botnet attempts to steal credentials from infected TBK DVR devices, in addition to abusing them to launch DDoS attacks.

Botnet

The newly identified Mirai-based Broadside botnet has been targeting vulnerable digital video recorder (DVR) products from TBK Vision in a campaign that could pose a significant threat to the maritime logistics sector, Cydome reports.

The Broadside malware infects TBK DVR devices impacted by CVE-2024-3721, an OS command injection flaw that can be exploited remotely for arbitrary code execution.

The insufficient validation of user-supplied input allows remote, unauthenticated attackers to execute arbitrary code via crafted HTTP requests.

While the flaw was identified on TBK DVR-4104 and DVR-4216 devices, TBK’s models are rebranded and sold under other names as well, including CeNova, HVR Login, Night Owl, Novo, Pulnix, QSee, and Securus.

The security defect was publicly disclosed in April 2024, when proof-of-concept (PoC) code targeting it was already available.

By mid-2025, multiple botnets capable of launching distributed denial-of-service (DDoS) had already been exploiting the flaw.

Advertisement. Scroll to continue reading.

Kaspersky said in early June that there had been over 50,000 exposed DVR devices, with infections in China, India, Egypt, Ukraine, Russia, Turkey, and Brazil.

A few weeks later, Fortinet warned of a surge in exploitation attempts, attributed to the Condi, Fodcha, Mirai, and Unstable botnets.

Now, Cydome says the Broadside botnet has joined the fray, targeting vulnerable devices to execute a mass loader script directly into their memory.

The loader blindly attempts to fetch and run payloads targeting all supported architectures, executes the malware in memory, and removes artifacts from the disk to evade detection.

The same as other Mirai offsprings, the Broadside botnet has DDoS capabilities, via UDP flooding, but employs a custom command-and-control (C&C) protocol, and uses Netlink kernel sockets for process monitoring.

Cydome also observed the malware attempting to harvest system credential files, likely for lateral movement into the compromised network.

Additionally, Broadside has a process killer module that attempts to maintain control over the device by terminating processes that match specific patterns, fail checks, or are considered hostile.

The cybersecurity firm underlines the threat the new campaign poses to shipping companies, as the targeted DVRs are typically used on vessels.

Thus, the infected devices could be used to tap into CCTV feeds for a vessel’s bridge, cargo holds, and engine room, to flood a ship’s satellite communication, or move laterally to critical OT systems on the ship.

Related: Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps

Related: RondoDox Botnet Takes ‘Exploit Shotgun’ Approach

Related: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability

Related: TurboMirai-Class ‘Aisuru’ Botnet Blamed for 20+ Tbps DDoS Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.