Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack

ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack

Posted on September 24, 2025September 24, 2025 By CWS

A classy cybercrime marketing campaign has emerged that transforms authentic AWS infrastructure into weaponized assault platforms by way of an progressive mixture of containerization and distributed denial-of-service capabilities.

The ShadowV2 botnet represents a big evolution in cyber threats, leveraging uncovered Docker daemons on Amazon Net Providers EC2 cases to determine persistent footholds for large-scale DDoS operations.

This marketing campaign demonstrates an alarming shift towards skilled, service-oriented cybercrime infrastructure that mirrors authentic cloud-native purposes in each design and performance.

The assault begins with risk actors working from GitHub CodeSpaces, using a Python-based command-and-control framework to scan for and exploit misconfigured Docker installations.

Not like conventional botnet operations that depend on pre-built malicious containers, ShadowV2 employs a singular multi-stage deployment course of that creates customized containerized environments instantly on sufferer machines.

The malware establishes communication with its operators by way of a RESTful API structure, implementing refined polling and heartbeat mechanisms that guarantee persistent connectivity whereas evading detection by way of legitimate-appearing community visitors.

Darktrace analysts recognized the malware throughout routine honeypot monitoring, discovering that the marketing campaign particularly targets AWS EC2 cases working uncovered Docker daemons.

The login UI (Supply – Darktrace)

The researchers noticed the risk actors utilizing superior assault strategies together with HTTP/2 fast reset assaults, Cloudflare under-attack mode bypasses, and large-scale HTTP flood campaigns.

These capabilities, mixed with a totally operational person interface and OpenAPI specification, point out that ShadowV2 capabilities as a complete DDoS-as-a-service platform fairly than a standard botnet, providing paying prospects the power to launch refined distributed assaults in opposition to focused infrastructure.

A snippet exhibiting the fasthttp consumer creation loop (Supply – Darktrace)

The malware’s structure reveals a regarding stage of professionalism, with the whole operation designed round a modular, service-oriented strategy that features person authentication, privilege administration, and assault limitations primarily based on subscription tiers.

This evolution represents a elementary shift in cybercrime economics, the place malicious infrastructure more and more resembles authentic software-as-a-service choices by way of person expertise, reliability, and have completeness.

Technical An infection and Deployment Mechanism

The ShadowV2 botnet employs a classy three-stage deployment course of that distinguishes it from typical Docker-based malware campaigns.

Preliminary compromise happens by way of Python scripts hosted on GitHub CodeSpaces, identifiable by way of distinctive HTTP headers together with Person-Agent: docker-sdk-python/7.1.0 and X-Meta-Supply-Shopper: github/codespaces.

These indicators reveal the attackers’ use of the Python Docker SDK library, which permits programmatic interplay with Docker daemon APIs to create and handle containerized environments on course programs.

The ballot mechanism (Supply – Darktrace)

The assault methodology deviates considerably from typical Docker exploitation patterns. As an alternative of deploying pre-built malicious photos from Docker Hub or importing customized containers, the malware first spawns a generic Ubuntu-based setup container and dynamically installs crucial instruments inside it.

This container is then dedicated as a brand new picture and deployed as a dwell container with malware arguments handed by way of environmental variables together with MASTER_ADDR and VPS_NAME identifiers.

The containerized payload consists of a Go-based ELF binary positioned at /app/deployment that implements a strong communication protocol with the command-and-control infrastructure.

Upon execution, the malware generates a singular VPS_ID by concatenating the supplied VPS_NAME with the present Unix timestamp, making certain distinct identification for every compromised system.

This identifier facilitates command routing and maintains session continuity even throughout malware restarts or reinfections.

The binary establishes two persistent communication loops: a heartbeat mechanism that transmits the VPS_ID to hxxps://shadow.aurozacloud[.]xyz/api/vps/heartbeat each second by way of POST requests, and a command polling system that queries hxxps://shadow.aurozacloud[.]xyz/api/vps/ballot/ each 5 seconds by way of GET requests.

This dual-channel strategy ensures each operational visibility for attackers and dependable command supply to compromised infrastructure, whereas sustaining the looks of authentic API visitors that may evade network-based detection mechanisms.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, AWS, Botnet, Containers, DDoS, Docker, Exploits, Infected, ShadowV2, System, Thems, Turn

Post navigation

Previous Post: Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps
Next Post: Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Related Posts

Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets Cyber Security News
DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year Cyber Security News
Threat Actors Turning Job Offers Into Traps, Over 4 Million Lost in 2024 Alone Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone Cyber Security News
North Korean Operatives Exploit LinkedIn for Remote Tech Jobs North Korean Operatives Exploit LinkedIn for Remote Tech Jobs Cyber Security News
10 Best NGINX Monitoring Tools 10 Best NGINX Monitoring Tools Cyber Security News
5 Email Attacks SOCs Cannot Detect Without A Sandbox  5 Email Attacks SOCs Cannot Detect Without A Sandbox  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News