A botnet is actively exploiting a zero-day vulnerability in GeoVision devices to install Mirai malware, targeting a range of security cameras and network video recorders (NVRs). GeoVision, a Taiwanese company specializing in video surveillance products, has over 100,000 devices installed worldwide, making it a significant target. Security researchers discovered that attackers exploit this flaw to gain unauthorized access, compromise devices, and add them to the Mirai botnet CVE-2024-11120, which is widely used for launching Distributed Denial of Service (DDoS) attacks. The exploitation process involves leveraging the zero-day vulnerability to gain access to vulnerable GeoVision devices. Once compromised, the devices are co-opted into the Mirai botnet, which uses them to amplify its network of infected systems. These devices are then employed to launch large-scale DDoS attacks or other malicious activities. Researchers noted that the attackers also aim to maintain persistence on compromised systems by installing malware components that hinder removal or detection. The vulnerability remains unpatched, increasing the urgency for users to implement security measures, such as isolating affected devices from external networks. This campaign highlights the ongoing risks posed by IoT device vulnerabilities, particularly in widely used security equipment. Businesses and users are advised to monitor their GeoVision devices, implement network segmentation, and apply robust security configurations. The growing threat of IoT-based botnets like Mirai underscores the importance of timely patching and securing internet-connected devices, as their exploitation can have far-reaching impacts on critical infrastructure and network stability.
A new report by Resecurity’s HUNTER team has uncovered a major data extortion campaign by a cybercriminal group calling itself “Trinity of Chaos.” Linked to Lapsus$, Scattere...
Elastic has addressed five newly discovered vulnerabilities that impact its Kibana and Elasticsearch components, issuing security advisories for each. These include three high-seve...
OpenSSH client ProxyCommand parsing has a surprising edge when the %r token (the remote username) is expanded, control characters like newlines weren’t being removed. This lets a...