A new variant of the Mirai botnet, named Broadside, is targeting the maritime sector by exploiting a critical vulnerability in TBK Vision Digital Video Recorders (DVRs). According to research from cybersecurity firm Cydome, the botnet spreads by exploiting CVE-2024-3721, an OS command injection flaw, to compromise vulnerable DVRs commonly used on ships for security surveillance. Broadside demonstrates a significant evolution from its predecessors, incorporating advanced features for stealth, persistence, and C2 communication. More alarmingly, its capabilities go beyond traditional DDoS attacks; the malware actively harvests credentials, seeks to terminate competing malware, and prepares for lateral movement within the ship's network. This transforms a simple IoT device into a dangerous pivot point, posing a severe risk to both the IT and Operational Technology (OT) systems of maritime vessels.
Broadside's initial access vector is the exploitation of CVE-2024-3721, a command injection vulnerability in the /device.rsp endpoint of TBK DVRs and their many rebranded versions (including CeNova, QSee, and Night Owl). This allows an unauthenticated remote attacker to take full control of the device.
Once compromised, the Broadside malware exhibits several advanced features:
0x36694201), designed to evade signature-based network detection./etc/passwd and /etc/shadow, indicating an intent to escalate privileges and move laterally across the network.The botnet's operation can be mapped to the MITRE ATT&CK framework:
T1190 - Exploit Public-Facing Application by exploiting CVE-2024-3721 on the DVR's web interface.T1059.004 - Unix Shell is used as part of the initial command injection exploit.T1562.001 - Impair Defenses: Disable or Modify Tools by terminating competing malware processes. The custom C2 protocol is a form of T1071.004 - Application Layer Protocol: DNS (if over DNS) or T1071.001 - Web Protocols if over HTTP, but more generally T1573.002 - Encrypted Channel: Asymmetric Cryptography if encrypted.T1003.008 - OS Credential Dumping: /etc/passwd and /etc/shadow.T1498 - Network Denial of Service), its primary threat in this context is as a foothold for further intrusion.The targeting of the maritime sector is particularly concerning. A compromised DVR on a ship's network is not just a bot for DDoS attacks; it's a pivot point into a sensitive and isolated environment. The potential impact includes:
| Type | Value | Description |
|---|---|---|
url_pattern |
*/device.rsp |
HTTP requests to this vulnerable endpoint are a key indicator of scanning or exploitation attempts. |
network_traffic_pattern |
0x36694201 |
The "Magic Header" used in Broadside's C2 communication. Detectable with deep packet inspection. |
port |
1026 |
One of the TCP ports used for C2 communication. |
port |
6969 |
A second TCP port observed being used for C2 communication. |
file_path |
/etc/passwd, /etc/shadow |
Monitor for anomalous access to these files by processes associated with the DVR software. |
D3-NI: Network Isolation.D3-NTA: Network Traffic Analysis.D3-SU: Software Update.Isolate IoT devices like DVRs on a separate network segment away from critical IT and OT systems to contain any potential compromise.
Mapped D3FEND Techniques:
Patch vulnerable DVRs or replace them if patches are unavailable.
Mapped D3FEND Techniques:
Block inbound access to the DVR's web interface from the internet and use an IDS to monitor for exploit signatures.
Mapped D3FEND Techniques:
For maritime operators, the most critical defense against the Broadside botnet is strict network isolation. The vulnerable DVRs should be placed on a dedicated, untrusted network segment (e.g., a 'Crew Welfare' or 'Surveillance' VLAN) that is completely isolated from both the corporate IT network and, most importantly, the ship's Operational Technology (OT) network. Implement firewall rules that deny all traffic from the surveillance VLAN to the IT and OT networks by default. Any required data transfer (e.g., video footage backup) should transit through a DMZ and be subject to inspection. This containment strategy ensures that even if a DVR is compromised by Broadside, the malware cannot pivot to more critical systems like navigation or engine control, thus mitigating the risk of a physical incident.
Deploy a network intrusion detection system (NIDS) with deep packet inspection capabilities to monitor traffic to and from the DVRs. Create a custom signature to detect the unique Broadside C2 'Magic Header' (0x36694201). Additionally, configure alerts for any HTTP requests to the vulnerable /device.rsp endpoint, which indicates scanning or active exploitation of CVE-2024-3721. Also, baseline normal traffic from these devices and alert on any deviations, such as outbound connections on non-standard ports like TCP/1026 and TCP/6969, or any attempt by a DVR to access internal resources. This allows for the rapid detection of a compromised device, enabling incident responders to isolate it before lateral movement occurs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats