Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises

Posted on November 5, 2025November 5, 2025 By CWS

A classy evolution of the RondoDox botnet has emerged with a staggering 650% improve in exploitation capabilities, marking a major escalation within the risk panorama for each enterprise and IoT infrastructure.

First documented by FortiGuard Labs in September 2024, the unique RondoDox variant centered narrowly on DVR methods with simply two exploit vectors.

The newly found RondoDox v2, nevertheless, demonstrates a dramatic growth with over 75 distinct exploitation vectors focusing on every little thing from legacy routers to trendy enterprise purposes.

This evolution represents a elementary shift in botnet improvement technique, bridging the hole between opportunistic IoT exploitation and focused enterprise compromise.

The malware was detected on October 30, 2025, by honeypot telemetry when analysis infrastructure started receiving automated exploitation makes an attempt from IP deal with 124.198.131.83 originating from New Zealand.

The assault sample instantly distinguished itself by its quantity and class, deploying 75 distinct exploit payloads in speedy succession.

Every payload tried command injection vectors focusing on router and IoT vulnerabilities, with all payloads downloading malicious scripts from the command-and-control server at 74.194.191.52.

Unusually, the risk actor embedded an open attribution signature—[email protected]—immediately into Consumer-Agent strings, marking a departure from the nameless operational safety sometimes employed by botnet operators.

Beelzebub analysts recognized the malware by their AI-native deception platform, which captured the whole assault chain and enabled complete technical evaluation of the botnet’s capabilities.

RondoDox v2 targets an intensive vary of susceptible units spanning a number of vendor ecosystems and spanning over a decade of CVE historical past.

The exploit arsenal consists of vital vulnerabilities akin to CVE-2014-6271 (Shellshock), CVE-2018-10561 (Dasan GPON routers), CVE-2021-41773 (Apache HTTP Server), and CVE-2024-3721 (TBK DVR methods).

The malware demonstrates cross-platform flexibility by deploying 16 architecture-specific binaries together with x86_64, a number of ARM variants, MIPS, PowerPC, and even legacy architectures like m68k and SPARC.

This complete structure assist ensures most an infection potential throughout various embedded methods and enterprise servers.

The command-and-control infrastructure operates on compromised residential IP addresses distributed throughout a number of ASNs, offering resilience and evasion capabilities that make conventional blocking methods much less efficient.

Technical Infrastructure and Obfuscation Mechanisms

The dropper script employed by RondoDox v2 showcases refined evasion and persistence methods designed to bypass safety controls and get rid of competing malware.

Upon execution, the script instantly disables SELinux and AppArmor safety frameworks utilizing instructions akin to setenforce 0 and repair apparmor cease, creating an atmosphere conducive to malicious exercise.

The script then proceeds with aggressive competitor elimination, systematically killing processes related to cryptocurrency miners like xmrig and different identified botnet households together with redtail.

This conduct ensures useful resource monopolization on contaminated methods whereas decreasing detection chance by eliminating noisy competing malware.

The binary payload itself employs XOR-based string obfuscation with a key worth of 0x21 to hide vital configuration information from static evaluation instruments.

Decoded strings reveal command-and-control protocol implementations together with “handshake” for C2 initialization and “udpraw” indicating DDoS capabilities.

The malware demonstrates anti-analysis consciousness by checking for exit code 137, which signifies SIGKILL termination generally employed by automated sandbox environments.

Detection of this situation causes rapid script termination, successfully evading many automated malware evaluation methods.

#!/bin/sh
# [email protected]
exec > /dev/null 2>&1
[ -t 0 ] && exit 0
for p in /proc/[0-9]*; do pid=${p##*/}; [ ! -e “$p/exe” ] && kill -9 $pid 2>/dev/null; performed
setenforce 0
service apparmor cease
mount -o remount,rw /||sudo mount -o remount,rw /

Attak execution (Supply – Beelzebub)

Persistence mechanisms leverage cron-based scheduling with @reboot directives, guaranteeing automated execution following system restarts.

The malware makes an attempt set up throughout a number of filesystem places together with /tmp/lib/rondo, /dev/shm/lib/rondo, and /var/tmp/lib/rondo, demonstrating consciousness of various system configurations and permission constructions.

Community communication happens over TCP port 345 utilizing a customized binary protocol that initiates with a “handshake” message to the first C2 server at 74.194.191.52.

The malware spoofs Consumer-Agent strings to seem as respectable iPhone iOS 18.5 units, additional obscuring malicious visitors inside enterprise environments.

DDoS capabilities embrace HTTP flood assaults mimicking gaming visitors, UDP uncooked socket operations, TCP SYN flooding, and protocol mimicry for OpenVPN, WireGuard, and widespread gaming platforms together with Minecraft, Fortnite, and Discord.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Arsenal, Botnet, Enterprises, Exploits, RondoDox, Targeting, Updated

Post navigation

Previous Post: New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely
Next Post: Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed

Related Posts

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability Cyber Security News
Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware Cyber Security News
Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Cyber Security News
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Cyber Security News
New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face Cyber Security News
Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News