Lily
Anne

Botnet Alert: New “Nexcorium” Mirai Variant Exploits IoT Flaws to Threaten Enterprise Networks

Lily Anne

Apr 21, 2026

5 min read

New Nexcorium Mirai Variant Threatens Enterprise Networks

TL;DR

Nexcorium botnet IoT security is now a critical concern as a new Mirai-based variant targets vulnerable edge devices to build large-scale attack infrastructure.

  • IoT Weaponization: A newly reported Mirai-based botnet called Nexcorium is actively targeting TBK DVR devices and scanning for vulnerable, end-of-life networking hardware.
  • The Exploit: Nexcorium leverages CVE-2024-3721, a command injection vulnerability in TBK DVRs, to deploy a multi-architecture malware payload capable of launching DDoS attacks.
  • Persistent & Adaptive: The malware uses XOR-encoded configurations and persistence mechanisms such as cron jobs and system services to maintain long-term control.
  • Brute-Force Expansion: In addition to exploiting vulnerabilities, Nexcorium uses hard-coded credentials to brute-force Telnet access and expand across exposed IoT devices.

The Nexcorium Threat

Enterprise security strategies often prioritize endpoints like laptops and servers, but Nexcorium underscores a persistent gap: unmanaged IoT devices at the network edge.

Devices such as DVRs, cameras, and legacy routers frequently operate outside centralized security controls. This makes them attractive targets for botnet operators seeking to build distributed attack infrastructure.

Rather than directly targeting enterprise systems, Nexcorium focuses on compromising large volumes of weakly secured IoT devices, which are then orchestrated to launch high-volume Distributed Denial-of-Service (DDoS) attacks.

This shift reflects a broader trend: attackers are investing in scale and persistence at the edge, rather than precision attacks on hardened endpoints.

Secure Your Network Edge with Hexnode UEM

How Nexcorium Infiltrates the Perimeter

Nexcorium is engineered to exploit the most neglected components of modern networks.

The Entry Point:
Attackers exploit CVE-2024-3721 in TBK DVR-4104 and DVR-4216 devices. By manipulating request parameters, they execute a remote command that downloads a payload (commonly named “dvr”) onto the device.

Architecture-Agnostic Malware:
The botnet includes binaries compiled for ARM, MIPS, and x86-64 architectures, enabling it to infect a wide range of Linux-based IoT systems.

Command and Control (C2):
Once infected, devices connect to a command-and-control server and await instructions. The malware has been observed supporting multiple DDoS attack vectors, including UDP and TCP flooding.

In-Network Expansion:
Nexcorium also incorporates propagation techniques such as Telnet brute-forcing and attempts to exploit known vulnerabilities (e.g., CVE-2017-17215). These mechanisms are designed to increase botnet size, not to perform targeted enterprise intrusion.

Why IoT Security is an Endpoint Problem

Although Nexcorium primarily builds botnets, its presence inside a corporate network introduces indirect risk to enterprise endpoints.

An infected IoT device becomes an unmonitored, persistent node within the local network. While current evidence does not indicate targeted lateral movement, such devices can:

  • Generate abnormal network traffic
  • Interact unpredictably with managed systems
  • Increase the attack surface within internal networks

The real issue is visibility. Traditional endpoint protection platforms do not extend to IoT hardware, leaving a blind spot in security posture.

As enterprise environments converge, unmanaged devices and managed endpoints increasingly share the same network fabric—making isolation and policy enforcement critical.

Hexnode’s Role: The Converged “Security Brain”

Hexnode UEM addresses this challenge by enforcing control, visibility, and access governance across the enterprise ecosystem.

Pillar 1: Absolute Governance (UEM)

Hexnode UEM enables network-level policy enforcement through features like network fencing. IT teams can restrict managed devices from communicating with unauthorized or unmanaged IoT hardware on the same network.

This segmentation ensures that even if an IoT device is compromised, it cannot interact with critical endpoints.

Pillar 2: Detecting “Intent” (XDR)

Compromised IoT devices often generate anomalous traffic patterns.

Hexnode XDR helps detect these signals by monitoring endpoint behavior. If a managed device encounters unusual connection attempts or suspicious local traffic, it can be flagged and isolated before escalation.

Pillar 3: Tethering Identity to Hardware (IdP)

Botnets frequently support credential-based attacks at scale.

Hexnode IdP mitigates this risk by binding user identity to verified, compliant devices. Even if credentials are exposed elsewhere, access remains restricted to trusted endpoints.

Hexnode-IdP-Solution-brief
Featured Resource

Hexnode IdP Solution Brief

Unify Access Control by Merging Identity & Device Posture

Download Datasheet

Pillar 4: The Invisibility Cloak (SASE)

With Zero Trust Network Access (ZTNA), enterprise applications are no longer exposed to the public internet.

Hexnode’s SASE framework ensures that internal resources remain invisible to external scanning and botnet probing, significantly reducing the attack surface.

Summary: Securing the Unified Perimeter

The Nexcorium botnet highlights a critical reality: the enterprise perimeter now extends to every connected device.

While Nexcorium’s current focus is on building DDoS infrastructure through IoT exploitation, its success is rooted in a familiar weakness—unsecured and unmanaged edge devices.

Organizations must move beyond traditional endpoint security and adopt a unified, policy-driven approach that includes:

  • Device visibility
  • Network segmentation
  • Identity enforcement
  • Zero Trust access

Hexnode’s converged platform provides this foundation, ensuring that threats at the edge remain contained and do not impact core enterprise systems.

Is your network edge secure? Strengthen your unified perimeter with Hexnode.

Share

Lily Anne

Content writer at Hexnode. Fueled by good coffee and the occasional cat cuddle, I enjoy crafting content that informs, connects, and resonates. Nothing excites me more than knowing my words have been read, appreciated, and maybe even bookmarked.