Vulnerable TVT DVRs, most of which are in the U.S., UK, and Germany, have been subjected to intrusions from 6,600 unique IPs during the past month, most of which are from Taiwan, Japan, and South Korea, a report from GreyNoise showed. Such findings come amid increased targeting of internet-exposed DVRs by botnets, including Mirai, HiatusRAT, and FreakOut. While updating impacted devices has been primarily advised to prevent potential distributed denial-of-service attacks, users that could not apply updates have been urged to restrict public internet access to DVR ports, as well as prohibit requests from listed IP addresses.
IoT, Vulnerability Management, Network Security, Threat Intelligence
Deluge of TVT DVR exploitation attempts likely due to Mirai-based botnet

(Adobe Stock)
Attempted attacks against TVT Digital Technology's NVMS9000 DVRs which had its firmware last updated seven years ago have surged, with devices impacted by an information disclosure flaw reported in May targeted by more than 2,500 IPs suspected to be part of a Mirai-based botnet on Thursday, according to BleepingComputer.
Vulnerable TVT DVRs, most of which are in the U.S., UK, and Germany, have been subjected to intrusions from 6,600 unique IPs during the past month, most of which are from Taiwan, Japan, and South Korea, a report from GreyNoise showed. Such findings come amid increased targeting of internet-exposed DVRs by botnets, including Mirai, HiatusRAT, and FreakOut. While updating impacted devices has been primarily advised to prevent potential distributed denial-of-service attacks, users that could not apply updates have been urged to restrict public internet access to DVR ports, as well as prohibit requests from listed IP addresses.
Vulnerable TVT DVRs, most of which are in the U.S., UK, and Germany, have been subjected to intrusions from 6,600 unique IPs during the past month, most of which are from Taiwan, Japan, and South Korea, a report from GreyNoise showed. Such findings come amid increased targeting of internet-exposed DVRs by botnets, including Mirai, HiatusRAT, and FreakOut. While updating impacted devices has been primarily advised to prevent potential distributed denial-of-service attacks, users that could not apply updates have been urged to restrict public internet access to DVR ports, as well as prohibit requests from listed IP addresses.
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds