{"id":45524,"date":"2026-04-18T00:24:29","date_gmt":"2026-04-17T16:24:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/new-mirai-variant-nexcorium-hijacks-dvr-devices-for-ddos-attacks\/"},"modified":"2026-04-18T00:24:29","modified_gmt":"2026-04-17T16:24:29","slug":"new-mirai-variant-nexcorium-hijacks-dvr-devices-for-ddos-attacks","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/new-mirai-variant-nexcorium-hijacks-dvr-devices-for-ddos-attacks\/","title":{"rendered":"New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks"},"content":{"rendered":"\n<p>Cybersecurity researchers at Fortinet\u2019s FortiGuard Labs have found a new malware that is taking over smart devices across the globe. This threat, named Nexcorium, is a new version of the infamous <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/mirai-botnet-ddos-attacks-brief\/\">Mirai malware<\/a>. It is built to create a botnet, which is a large network of infected IoT devices and gadgets controlled by hackers to carry out large-scale DDoS attacks.<\/p>\n<h3><strong>How the hackers gain access<\/strong><\/h3>\n<p>FortiGuard Lab&#8217;s security analysts have found that in this campaign, the key targets of hackers are video recording boxes used for security cameras, preferably the TBK DVR-4104 and DVR-4216 models. That&#8217;s probably because these devices are rarely updated and have weak security settings, hence being easier to compromise. <\/p>\n<p>According to researchers, attackers are abusing <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3721\">CVE-2024-3721<\/a>, a command injection vulnerability in these specific devices, allowing hackers to gain access and run malicious code and gain persistent remote access.<\/p>\n<p>Upon successful compromise, it leads to the showing of a message on the system saying &#8220;NexusCorp has taken control.&#8221; This gives away the attackers&#8217; identity, which, according to researchers, is the Nexus Team. They even leave a signature in the code that says &#8220;Nexus Team \u2013 Exploited By Erratic,&#8221; thus validating this attribution.<\/p>\n<h3><strong>Malware Capabilities<\/strong><\/h3>\n<p>In their <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/tracking-mirai-variant-nexcorium-a-vulnerability-driven-iot-botnet-campaign\">blog post<\/a> shared with Hackread.com ahead of publishing on Friday, Vincent Li of FortiGuard Labs noted that Nexcorium is a \u201cmulti-architecture\u201d malware, which means it can work on different processors. <\/p>\n<p>The malware is also difficult to get rid of because it copies itself into several different folders. It then sets up automatic tasks so that if the device is turned off and on again, the malware just starts back up, and even deletes its own original files to hide from anyone trying to find it.<\/p>\n<p>To extend the botnet network, the malware tries to compromise other <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/maintain-security-protect-smart-home-devices-hackers\/\">smart devices<\/a> in the same building. For this purpose, it uses a built-in, long list of basic passwords like &#8220;admin123, 12345, and guest.&#8221; Additionally, by using <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/brute-force-campaign-fortinet-ssl-vpn-coordinated-attack\/\">brute force<\/a>, Nexcorium keeps trying these passwords one by one to see if it can log into other routers or cameras.<\/p>\n<figure>\n<table>\n<tbody>\n<tr>\n<td>ubuntu<\/td>\n<td>guest<\/td>\n<td>support<\/td>\n<td>default<\/td>\n<\/tr>\n<tr>\n<td>12345<\/td>\n<td>123456<\/td>\n<td>changeme<\/td>\n<td>hikvision<\/td>\n<\/tr>\n<tr>\n<td>operator<\/td>\n<td>888888<\/td>\n<td>Administrator<\/td>\n<td>meinsm<\/td>\n<\/tr>\n<tr>\n<td>7ujMko0admin<\/td>\n<td>admin123<\/td>\n<td>admin1234<\/td>\n<td>admintest<\/td>\n<\/tr>\n<tr>\n<td>comcomcom<\/td>\n<td>motorola<\/td>\n<td>password<\/td>\n<td>daemon<\/td>\n<\/tr>\n<tr>\n<td>OxhlwSG8<\/td>\n<td>S2fGqNFs<\/td>\n<td>tlJwpbo6<\/td>\n<td>D-Link<\/td>\n<\/tr>\n<tr>\n<td>netscreen<\/td>\n<td>7ujMko0vizxv<\/td>\n<td>GM8182<\/td>\n<td>Root1<\/td>\n<\/tr>\n<tr>\n<td>Zte521<\/td>\n<td>antslq<\/td>\n<td>cat1029<\/td>\n<td>dreambox<\/td>\n<\/tr>\n<tr>\n<td>grouter<\/td>\n<td>hg2x0<\/td>\n<td>huigu309<\/td>\n<td>ipcam_rt5350<\/td>\n<\/tr>\n<tr>\n<td>jauntech<\/td>\n<td>solokey<\/td>\n<td>swsbzkgn<\/td>\n<td>taZz@23495859<\/td>\n<\/tr>\n<tr>\n<td>tsgoingon<\/td>\n<td>vertex25ektks123<\/td>\n<td>xc3511<\/td>\n<td>xmhdipc<\/td>\n<\/tr>\n<tr>\n<td>Zhongxing<\/td>\n<td>telnet<\/td>\n<td>telnetadmin<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table><figcaption>List of hardcoded passwords used for Brute Forcing (Credit: Fortinet)<\/figcaption><\/figure>\n<h3><strong>DDoS Attacks<\/strong><\/h3>\n<p>The main purpose of this entire exercise is to launch Distributed Denial of Services (<a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/botnet-device-drives-2-tbps-ddos-attacks-fintech\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/botnet-device-drives-2-tbps-ddos-attacks-fintech\/\">DDoS<\/a>) attacks in which thousands of infected devices flood a website with so much fake traffic that it crashes and stops working.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>Researchers noted that Nexcorium malware displays \u201ctypical traits of modern IoT-focused botnets, combining vulnerability exploitation, support for multiple architectures, and various persistence methods to sustain long-term access to infected systems. Its use of known exploits, such as <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/two-mirai-botnets-lzrd-resgod-exploiting-wazuh-flaw\/\" data-type=\"post\" data-id=\"131061\">CVE-2017-17215<\/a>, along with extensive brute-force capabilities, underscores its adaptability and efficacy in increasing its infection reach.\u201d<\/p>\n<p>Since Nexcorium can run on many different types of hardware, it is a high-level threat to any organisation using these recording boxes. Therefore, changing default passwords and keeping software updated is the best way to stay safe.<\/p>\n<p>&#8220;The Nexcorium campaign is a precise illustration of why automated scanning alone cannot close the exposure gap. Machine speed analysis tells you a vulnerability exists, but a human researcher&#8217;s depth tells you how an adversary will chain it, weaponize it, and sustain access long after the initial alert fires,&#8221; said <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/www.linkedin.com\/in\/treyford\">Trey Ford<\/a>, Chief Strategy and Trust Officer at Bugcrowd, a San Francisco, Calif.-based crowdsourced cybersecurity.<\/p>\n<p>&#8220;What organizations need is continuous adversarial testing that mirrors actual attacker behavior across the full asset inventory, including the devices that security teams have quietly placed out of scope,&#8221; he advised. &#8220;While classically true of professional attackers, the next generation of security defense programs will be defined by how aggressively they test the edges, not just the crown jewels.&#8221;<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"New Mirai Variant Nexcorium Hijacks DVR Devices for DDoS Attacks\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers at Fortinet\u2019s FortiGuard Labs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45524","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45524"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45524\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}