← Back to BrewedIntel
malwarehighBotnetExploitationMirai

Apr 07, 2025 • GreyNoise Blog

GreyNoise Observes 3X Surge in Exploitation Attempts Against TVT DVRs — Likely Mirai

GreyNoise reports a substantial threefold increase in exploitation attempts targeting TVT NVMS9000 digital video recorders (DVRs). These attacks leverage an...

Source
GreyNoise Blog
Category
malware
Severity
high

Executive Summary

GreyNoise reports a substantial threefold increase in exploitation attempts targeting TVT NVMS9000 digital video recorders (DVRs). These attacks leverage an information disclosure vulnerability inherent to the devices, potentially allowing adversaries to achieve administrative control. The activity is strongly associated with the Mirai malware family, suggesting the primary objective is recruiting compromised devices into a botnet for distributed denial-of-service (DDoS) campaigns. This surge indicates heightened risk for organizations utilizing affected TVT hardware within their network perimeter. Immediate mitigation requires patching the underlying vulnerability or isolating affected DVRs from public internet access. Administrators should audit network logs for suspicious outbound traffic indicative of botnet communication. Given the potential for widespread infrastructure abuse, security teams must prioritize firmware updates and enforce strict network segmentation to prevent unauthorized administrative access and limit the blast radius of potential compromises affecting surveillance systems.

Summary

GreyNoise has observed a significant spike in exploitation attempts against TVT NVMS9000 DVRs. This information disclosure vulnerability can be used to gain administrative control over affected systems.

Published Analysis

GreyNoise reports a substantial threefold increase in exploitation attempts targeting TVT NVMS9000 digital video recorders (DVRs). These attacks leverage an information disclosure vulnerability inherent to the devices, potentially allowing adversaries to achieve administrative control. The activity is strongly associated with the Mirai malware family, suggesting the primary objective is recruiting compromised devices into a botnet for distributed denial-of-service (DDoS) campaigns. This surge indicates heightened risk for organizations utilizing affected TVT hardware within their network perimeter. Immediate mitigation requires patching the underlying vulnerability or isolating affected DVRs from public internet access. Administrators should audit network logs for suspicious outbound traffic indicative of botnet communication. Given the potential for widespread infrastructure abuse, security teams must prioritize firmware updates and enforce strict network segmentation to prevent unauthorized administrative access and limit the blast radius of potential compromises affecting surveillance systems. GreyNoise has observed a significant spike in exploitation attempts against TVT NVMS9000 DVRs. This information disclosure vulnerability can be used to gain administrative control over affected systems. GreyNoise has observed a significant spike in exploitation attempts against TVT NVMS9000 DVRs. This information disclosure vulnerability can be used to gain administrative control over affected systems.

Linked Entities

  • Mirai