Monday, April 28, 2025
HomeBotnetNew Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

Published on

SIEM as a Service

Follow Us on Google News

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video Recorders (DVRs).

The surge in malicious activity, peaking on April 3, 2025, with over 2,500 unique IP addresses, suggests a new variant of the notorious Mirai botnet is at play, exploiting an information disclosure vulnerability to seize administrative control over these systems.

Surge in Exploitation Attempts

The recent exploitation campaign, identified by GreyNoise, commenced on March 31, 2025.

- Advertisement - Google News

Initially, the number of unique IP addresses trying to exploit the NVMS9000 DVR was relatively low, but it escalated rapidly, with over 6,600 IPs attempting to breach the system in the past month.

This spike is three times the usual activity levels, indicating a concerted effort by cybercriminals to expand the Mirai botnet’s reach.

Geographical Focus of the Attacks

The majority of these malicious IPs originate from the Asia-Pacific (APAC) region. Taiwan leads with 3,637 IPs, followed by Japan (809 IPs) and South Korea (542 IPs).

Interestingly, the top destinations for these attacks are Western countries, with the United States being the primary target (6,471 IPs), followed by the United Kingdom (5,738 IPs) and Germany (5,713 IPs).

This geographical targeting pattern suggests an organized, potentially state-sponsored or at least large-scale, operation.

According to the Report, GreyNoise’s analysis confirms that all IPs targeting this vulnerability are malicious and non-spoofable, emphasizing the need for immediate defensive actions by users of TVT NVMS9000 DVRs.

Security measures should include:

  • Patching: Immediate application of all available security patches to the DVR systems to close the exploited vulnerability.
  • Access Restrictions: Limiting internet access to DVR interfaces to prevent remote exploitation.
  • Network Monitoring: Vigilant monitoring of network traffic for signs of scanning or anomalies indicative of exploitation attempts.

TVT Digital Technology Co., Ltd., based in Shenzhen, provides DVRs like the NVMS9000 for extensive security and surveillance needs, serving over 120 countries.

The widespread use of these systems makes the exploitation attempt a significant threat, potentially allowing attackers full administrative control over crucial security infrastructure.

This latest activity by the Mirai botnet variant not only showcases the persistent vulnerability in IoT devices but also underscores the necessity for robust cybersecurity practices in enterprise environments.

Organizations relying on internet-connected security equipment must prioritize patching and network security to thwart these sophisticated cyber threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...