Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Botnet Expands to 174 Vulnerabilities

RondoDox Botnet Expands to 174 Vulnerabilities

Posted on March 17, 2026 By CWS

The RondoDox botnet has significantly broadened its scope, now targeting 174 vulnerabilities, according to a recent report by Bitsight. This marks a substantial increase from its previous activity, as the botnet’s developers refine their approach to exploiting security flaws.

Evolution of RondoDox Attacks

Initially observed in March 2025, RondoDox began its operations by executing widespread vulnerability scans. By the end of that year, the botnet was known to target 56 vulnerabilities, including some without CVE identifiers. Its focus then included exploiting vulnerabilities like React2Shell.

Bitsight now reports that RondoDox’s approach has shifted significantly. Rather than employing a broad, indiscriminate attack strategy, its operators are now concentrating on specific vulnerabilities that present a higher likelihood of successful exploitation.

Strategic Targeting and Techniques

RondoDox shares several traits with the Mirai botnet, particularly in its initial attack methods that involve exploiting weak credentials and unsanitized inputs. Unlike Mirai, however, RondoDox prioritizes launching distributed denial-of-service (DDoS) attacks over simply expanding its network of infected devices.

To facilitate its operations, RondoDox scans the internet for exposed devices, employing proprietary infrastructure to deploy malware implants designed to evade detection. These implants not only remove existing malware competitors but also establish a secure environment for executing their payload.

Ongoing Adaptation and Challenges

Bitsight’s investigation reveals that the botnet’s management leverages over 24 IP addresses for various tasks, including device exploitation and command distribution. Notably, the botnet’s operators frequently update their list of targeted vulnerabilities, sometimes exploiting up to 49 different flaws in a single day. However, they often discard most vulnerabilities quickly.

Interestingly, while RondoDox remains vigilant in monitoring the latest vulnerability disclosures, it struggles with effectively implementing some of these exploits. This suggests a trial-and-error approach, with the botnet’s operators continuously testing and adapting based on their success rates.

Despite its evolving strategies, Bitsight clarifies that RondoDox does not utilize loader-as-a-service for distribution, and prior assumptions about its peer-to-peer functionalities are unfounded.

Related articles highlight other cybersecurity threats, including disruptions in services like SocksEscort and the emergence of new botnets such as Aeternum and SSHStalker, underscoring the dynamic nature of cyber threats.

Security Week News Tags:BitSight, Botnet, cyber attacks, Cybersecurity, DDoS attacks, Exploitation, internet security, Malware, Mirai, network security, RondoDox, security research, security threats, Vulnerabilities, vulnerability scanning

Post navigation

Previous Post: Phishing Tactics Exploit Safe Links with Complex URL Rewrites
Next Post: PylangGhost RAT Targets Developers via npm Packages

Related Posts

Instagram Fixes Password Reset Vulnerability Amid User Data Leak Instagram Fixes Password Reset Vulnerability Amid User Data Leak Security Week News
SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware SonicWall SMA Appliances Targeted With New ‘Overstep’ Malware Security Week News
Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears Security Week News
RondoDox Botnet Expands to 174 Vulnerabilities SSHStalker Botnet Exploits Legacy Linux Vulnerabilities Security Week News
Google Researchers Find New Chrome Zero-Day Google Researchers Find New Chrome Zero-Day Security Week News
The Great Disconnect: Unmasking the ‘Two Separate Conversations’ in Security The Great Disconnect: Unmasking the ‘Two Separate Conversations’ in Security Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Flaw in UK Companies House Web Application Exposed
  • LeakNet Ransomware Adopts ClickFix for Attacks
  • Critical Kubernetes NFS Driver Flaw Exposes Server Risks
  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Flaw in UK Companies House Web Application Exposed
  • LeakNet Ransomware Adopts ClickFix for Attacks
  • Critical Kubernetes NFS Driver Flaw Exposes Server Risks
  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News