Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RondoDox Botnet Exploiting React2Shell Vulnerability

Posted on January 2, 2026January 2, 2026 By CWS

Current RondoDox botnet enrollment assaults have been focusing on Subsequent.js servers susceptible to React2Shell, CloudSEK reviews.

The focused safety defect, tracked as CVE-2025-55182, impacts programs counting on model 19 of the favored open supply JavaScript library React, and which use React Server Parts (RSC).

Publicly disclosed on December 3, 2025, React2Shell additionally impacts frameworks that leverage React, equivalent to Subsequent.js, React Router, RedwoodSDK, and Waku.

The bug permits unauthenticated attackers to ship specifically crafted HTTP requests to React Server Perform endpoints and obtain distant code execution (RCE).

Exploitation of the flaw began inside days of public disclosure and was initially related to China-linked risk teams. Per week later, a number of risk actors had been seen focusing on susceptible situations.

Based on CloudSEK, the RondoDox botnet’s operators joined the fray throughout that timeframe, and for the previous three weeks have centered on exploiting Subsequent.js situations affected by React2Shell.

Between December 8 and 16, they had been seen scanning for susceptible servers by means of blind RCE testing. On December 13, they began deploying malicious payloads.

The RondoDox operators had been seen dropping a botnet assist framework designed to purge the host of different botnets and cryptocurrency miners, deploy the bot consumer, and set up persistence. A miner and a Mirai variant had been additionally put in on the compromised programs.Commercial. Scroll to proceed studying.

Whereas the botnet’s React2Shell exploitation exercise concerned a Linux-focused payload, RondoDox is thought for taking an exploit shotgun method to infecting units.

The primary exploitation makes an attempt related to the botnet, CloudSEK says, occurred in March 2025, whereas systematic vulnerability scanning began in early April.

The operators engaged in widespread vulnerability probing between April and June and began the bot consumer’s deployment in July.

Since then, they’ve been ensnaring internet-facing routers, IP cameras, and community home equipment into the botnet, utilizing payloads for x86, x86_64, MIPS, ARM, and PowerPC architectures.

Along with exploiting internet purposes for preliminary entry, RondoDox assaults contain credential theft and lateral motion, CloudSEK notes.

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Gadgets

Associated: New ‘Broadside’ Botnet Poses Danger to Delivery Firms

Associated: Exploitation of React2Shell Surges

Security Week News Tags:Botnet, Exploiting, React2Shell, RondoDox, Vulnerability

Post navigation

Previous Post: Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach
Next Post: The ROI Problem in Attack Surface Management

Related Posts

Chinese Cyberspies Hacked US Defense Contractors Security Week News
Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Security Week News
Researchers Trap Scattered Lapsus$ Hunters in Honeypot Security Week News
US Student to Plead Guilty Over PowerSchool Hack Security Week News
Critical Vulnerability Exposes n8n Instances to Takeover Attacks Security Week News
North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark