Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware

RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware

Posted on January 2, 2026January 2, 2026 By CWS

A classy menace group has intensified its marketing campaign in opposition to organizations by leveraging the most recent vulnerabilities in net purposes and Web of Issues (IoT) gadgets.

The RondoDoX botnet, tracked by way of uncovered command-and-control logs spanning 9 months from March to December 2025, demonstrates a relentless method to compromising enterprise infrastructure.

The malware operates by way of a multi-stage an infection course of that begins with scanning for weak techniques and escalates to deploying cryptominers and botnet payloads throughout numerous community environments.

The marketing campaign reveals three distinct assault phases, every progressively extra subtle than the final. Initially, menace actors performed guide vulnerability testing on varied platforms.

POST Information logger (Supply – CloudSEK)

By April 2025, they shifted to automated every day scanning operations focusing on a number of net frameworks.

The ultimate section, starting in July 2025, escalated assaults to hourly deployment makes an attempt, showcasing the attackers’ dedication to steady exploitation and infrastructure compromise.

CloudSEK analysts recognized the malware by way of routine scans for malicious infrastructure, uncovering six confirmed command-and-control servers with overlapping operational durations.

The researchers found proof of no less than ten botnet variants actively deployed throughout compromised techniques, with command logs revealing detailed assault patterns and infrastructure utilization spanning the whole marketing campaign timeline.

Essentially the most alarming growth emerged in December 2025, when menace actors started weaponizing a crucial Subsequent.js vulnerability to deploy React2Shell payloads.

Assault chain

This transition demonstrates the group’s skill to quickly adapt and undertake newly disclosed safety flaws.

The assault chain begins with identification of weak servers by way of blind distant code execution testing, adopted by deployment of ELF binaries that obtain malicious payloads from lively command-and-control infrastructure.

The malware’s an infection mechanism reveals subtle persistence and evasion capabilities. As soon as deployed, the botnet establishes persistence by way of cron job configuration in system information and aggressively terminates competing malware to monopolize system assets.

The payload contains cryptominers and help frameworks designed for long-term dominance on compromised hosts.

The botnet helps a number of processor architectures together with x86, x86_64, MIPS, ARM, and PowerPC, with a number of fallback obtain mechanisms utilizing wget, curl, tftp, and ftp protocols to make sure profitable payload supply throughout heterogeneous enterprise environments.

Organizations with internet-facing routers, cameras, and purposes working Subsequent.js Server Actions face quick danger.

Community segmentation, quick patching of weak purposes, Internet Utility Firewall deployment, and steady monitoring for suspicious course of execution in short-term directories stay important defensive measures.

Moreover, blocking recognized command-and-control infrastructure at perimeter firewalls supplies crucial short-term safety in opposition to lively exploitation makes an attempt.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Botnet, Critical, Deploy, Malware, React2Shell, RondoDox, Vulnerability, Weaponizing

Post navigation

Previous Post: Potential Wallet Phishing Campaign Targets Cardano Users via ‘Eternl Desktop’ Announcement
Next Post: Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack

Related Posts

Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Cyber Security News
New Android Bug Impacts Volume Buttons Functionality with “Select to Speak” Enabled New Android Bug Impacts Volume Buttons Functionality with “Select to Speak” Enabled Cyber Security News
Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims Hackers Advertised VOID ‘AV Killer’ with Kernel-level Termination Claims Cyber Security News
Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally Cyber Security News
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games Cyber Security News
SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News