Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Emerging Malware Threatens Network Devices with DDoS and Crypto-Mining

Emerging Malware Threatens Network Devices with DDoS and Crypto-Mining

Posted on March 18, 2026 By CWS

Network security faces a formidable challenge as two novel malware strains have been identified, surreptitiously converting routers and IoT devices into tools for extensive distributed denial-of-service (DDoS) attacks and cryptocurrency mining. This development signifies a notable shift in how cybercriminals utilize the very infrastructure that organizations rely on daily.

Discovery of New Malware Strains

On March 6, 2026, security experts unearthed two previously undocumented malware strains. The first, dubbed CondiBot, is a DDoS botnet derived from the Mirai framework, targeting Linux-based network devices to transform them into nodes for intense traffic flooding. The second strain, Monaco, is a sophisticated SSH scanner and crypto miner in Go 1.24.0, designed to exploit weak SSH credentials in servers and IoT devices for Monero cryptocurrency mining.

Neither strain had prior recognition on leading threat intelligence platforms like VirusTotal, ThreatFox, and Hybrid Analysis, indicating their novel nature and potential for widespread impact.

Broader Implications for Network Security

Research by Eclypsium highlights that the targeting of network infrastructure is not solely the realm of state-sponsored advanced persistent threat groups. Financially motivated actors are increasingly exploiting vulnerabilities traditionally favored by state hackers. The 2025 Verizon Data Breach Investigation Report supports this, noting an eightfold rise in exploits targeting network devices, with zero-day vulnerability exploits becoming more common.

The Google Threat Intelligence Group further corroborates these findings, revealing that a significant portion of zero-day vulnerabilities in 2025 targeted network and security systems, underscoring the growing importance of safeguarding these areas.

Challenges in Detecting and Mitigating Threats

A critical challenge in combating these threats is the lack of visibility in most enterprise environments. Endpoint detection tools often overlook the embedded firmware layers of network appliances, allowing attackers to operate undetected for extended periods. This stealthy approach enables them to harness computational power or prepare for more extensive attacks.

CondiBot, for instance, employs multiple file transfer utilities to deliver its payload to vulnerable devices. It disables reboot utilities to prevent easy removal and connects to a command-and-control server to await attack instructions, showcasing its persistence and adaptability.

Security measures such as enforcing strong SSH credentials, disabling default passwords, monitoring firmware integrity, and applying patches promptly are essential to mitigate these threats. Vigilance in monitoring for unusual network activity is also crucial.

Stay informed by following us on Google News, LinkedIn, and X for more updates, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:attack vectors, crypto-mining, Cybersecurity, DDoS, firmware security, IoT security, Malware, network security, SSH vulnerabilities, threat intelligence

Post navigation

Previous Post: Join the Supply Chain & Risk Summit for Key Insights
Next Post: Native Emerges with $42M to Enhance Cloud Security

Related Posts

Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Cyber Security News
Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
Penetration Testing in the AI Era Tools and Techniques Penetration Testing in the AI Era Tools and Techniques Cyber Security News
English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks Cyber Security News
Choosing the Right Tool for Network Penetration Testing Choosing the Right Tool for Network Penetration Testing Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • EU Imposes Sanctions on Firms Linked to Cyber Attacks
  • DarkSword iOS Exploit Targets iPhone Users Worldwide
  • XBOW Secures $120M to Enhance AI Security Platform
  • OFAC Sanctions North Korean IT Network Exploiting Remote Jobs
  • Cisco Firewall Vulnerability Used for Ransomware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • EU Imposes Sanctions on Firms Linked to Cyber Attacks
  • DarkSword iOS Exploit Targets iPhone Users Worldwide
  • XBOW Secures $120M to Enhance AI Security Platform
  • OFAC Sanctions North Korean IT Network Exploiting Remote Jobs
  • Cisco Firewall Vulnerability Used for Ransomware Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark