New 'Broadside' Botnet Exploits DVRs to Target Maritime Logistics

'Broadside' Botnet Exploits DVR Flaw, Posing Significant Threat to Maritime Logistics Sector

HIGH
December 9, 2025
6m read
MalwareIndustrial Control SystemsIoT Security

Related Entities

Organizations

CydomeTBK Vision

Products & Tech

CeNovaQSeeNight Owl

Other

BroadsideMirai

CVE Identifiers

CVE-2024-3721
CRITICAL

Full Report

Executive Summary

A new variant of the Mirai botnet, named Broadside, is targeting the maritime sector by exploiting a critical vulnerability in TBK Vision Digital Video Recorders (DVRs). According to research from cybersecurity firm Cydome, the botnet spreads by exploiting CVE-2024-3721, an OS command injection flaw, to compromise vulnerable DVRs commonly used on ships for security surveillance. Broadside demonstrates a significant evolution from its predecessors, incorporating advanced features for stealth, persistence, and C2 communication. More alarmingly, its capabilities go beyond traditional DDoS attacks; the malware actively harvests credentials, seeks to terminate competing malware, and prepares for lateral movement within the ship's network. This transforms a simple IoT device into a dangerous pivot point, posing a severe risk to both the IT and Operational Technology (OT) systems of maritime vessels.


Threat Overview

Broadside's initial access vector is the exploitation of CVE-2024-3721, a command injection vulnerability in the /device.rsp endpoint of TBK DVRs and their many rebranded versions (including CeNova, QSee, and Night Owl). This allows an unauthenticated remote attacker to take full control of the device.

Once compromised, the Broadside malware exhibits several advanced features:

  • Stealthy Monitoring: It uses Netlink kernel sockets for process monitoring, a less noisy method than the filesystem polling used by older Mirai variants.
  • Custom C2 Protocol: It communicates with its C2 servers using a custom protocol identified by a unique "Magic Header" (0x36694201), designed to evade signature-based network detection.
  • Anti-Competition Module: A "Judge, Jury, and Executioner" function actively seeks and terminates other malware processes on the device, ensuring its exclusive control.
  • Credential Harvesting: The malware attempts to read and exfiltrate sensitive files like /etc/passwd and /etc/shadow, indicating an intent to escalate privileges and move laterally across the network.

Technical Analysis

The botnet's operation can be mapped to the MITRE ATT&CK framework:

Impact Assessment

The targeting of the maritime sector is particularly concerning. A compromised DVR on a ship's network is not just a bot for DDoS attacks; it's a pivot point into a sensitive and isolated environment. The potential impact includes:

  • Espionage: Attackers could gain access to live CCTV feeds of sensitive areas like the bridge, engine room, or cargo holds.
  • Network Disruption: A DDoS attack launched from within the ship's network could overwhelm its satellite communication link, cutting it off from shore-based support.
  • Lateral Movement to OT Systems: The greatest risk is the attacker pivoting from the IT network (where the DVR resides) to the Operational Technology (OT) network, which controls the ship's navigation, propulsion, and safety systems. A compromise here could have catastrophic physical consequences.
  • Credential Theft: Harvested credentials could be used to access other systems on the vessel's network, including crew accounts or administrative systems.

Cyber Observables for Detection

Type Value Description
url_pattern */device.rsp HTTP requests to this vulnerable endpoint are a key indicator of scanning or exploitation attempts.
network_traffic_pattern 0x36694201 The "Magic Header" used in Broadside's C2 communication. Detectable with deep packet inspection.
port 1026 One of the TCP ports used for C2 communication.
port 6969 A second TCP port observed being used for C2 communication.
file_path /etc/passwd, /etc/shadow Monitor for anomalous access to these files by processes associated with the DVR software.

Detection & Response

  • Network Segmentation: Ensure that IoT devices like DVRs are on a segregated network segment, isolated from critical IT and OT systems. Monitor and restrict all traffic between these segments. This is a core principle of D3FEND's D3-NI: Network Isolation.
  • Network Traffic Analysis: Use an IDS/IPS to monitor for exploitation attempts against CVE-2024-3721. Create rules to detect the unique Broadside C2 "Magic Header" in network traffic. This is an application of D3-NTA: Network Traffic Analysis.
  • Log Monitoring: Monitor DVR device logs for signs of compromise, such as unexpected reboots, configuration changes, or outbound network connections to unusual ports or IP addresses.
  • Asset Inventory: Maintain a comprehensive inventory of all connected devices on vessels, including the make, model, and software version of all DVRs, to quickly identify vulnerable systems.

Mitigation

  1. Patch or Replace: The primary mitigation is to patch the firmware of vulnerable TBK DVRs. If a patch is not available, the devices should be replaced with secure alternatives and disconnected from the network immediately. This is an application of D3-SU: Software Update.
  2. Restrict Network Access: If the device cannot be patched or replaced immediately, restrict all internet access to and from the DVR. If remote access is required, it should be done via a secure, multi-factor authenticated VPN connection.
  3. Change Default Credentials: Always change the default administrative passwords on DVRs and other IoT devices. While not the primary vector here, it is a critical security hygiene step that prevents simple brute-force attacks.
  4. Implement IT/OT Separation: For maritime operators, enforcing strict network separation between the Information Technology (IT) network and the Operational Technology (OT) network is paramount to prevent a DVR compromise from escalating into a physical safety incident.

Timeline of Events

1
December 9, 2025
This article was published

MITRE ATT&CK Mitigations

Isolate IoT devices like DVRs on a separate network segment away from critical IT and OT systems to contain any potential compromise.

Mapped D3FEND Techniques:

Patch vulnerable DVRs or replace them if patches are unavailable.

Mapped D3FEND Techniques:

Block inbound access to the DVR's web interface from the internet and use an IDS to monitor for exploit signatures.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

For maritime operators, the most critical defense against the Broadside botnet is strict network isolation. The vulnerable DVRs should be placed on a dedicated, untrusted network segment (e.g., a 'Crew Welfare' or 'Surveillance' VLAN) that is completely isolated from both the corporate IT network and, most importantly, the ship's Operational Technology (OT) network. Implement firewall rules that deny all traffic from the surveillance VLAN to the IT and OT networks by default. Any required data transfer (e.g., video footage backup) should transit through a DMZ and be subject to inspection. This containment strategy ensures that even if a DVR is compromised by Broadside, the malware cannot pivot to more critical systems like navigation or engine control, thus mitigating the risk of a physical incident.

Deploy a network intrusion detection system (NIDS) with deep packet inspection capabilities to monitor traffic to and from the DVRs. Create a custom signature to detect the unique Broadside C2 'Magic Header' (0x36694201). Additionally, configure alerts for any HTTP requests to the vulnerable /device.rsp endpoint, which indicates scanning or active exploitation of CVE-2024-3721. Also, baseline normal traffic from these devices and alert on any deviations, such as outbound connections on non-standard ports like TCP/1026 and TCP/6969, or any attempt by a DVR to access internal resources. This allows for the rapid detection of a compromised device, enabling incident responders to isolate it before lateral movement occurs.

Sources & References

New 'Broadside' Botnet Poses Risk to Shipping Companies
SecurityWeek (securityweek.com) December 9, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BotnetMiraiBroadsideMaritime SecurityIoTDVRICSOT

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading