Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShadowV2 Botnet Exploits Docker Containers on AWS to Turn Thems as Infected System for DDoS Attack

Posted on September 24, 2025September 24, 2025 By CWS

A classy cybercrime marketing campaign has emerged that transforms authentic AWS infrastructure into weaponized assault platforms by way of an progressive mixture of containerization and distributed denial-of-service capabilities.

The ShadowV2 botnet represents a big evolution in cyber threats, leveraging uncovered Docker daemons on Amazon Net Providers EC2 cases to determine persistent footholds for large-scale DDoS operations.

This marketing campaign demonstrates an alarming shift towards skilled, service-oriented cybercrime infrastructure that mirrors authentic cloud-native purposes in each design and performance.

The assault begins with risk actors working from GitHub CodeSpaces, using a Python-based command-and-control framework to scan for and exploit misconfigured Docker installations.

Not like conventional botnet operations that depend on pre-built malicious containers, ShadowV2 employs a singular multi-stage deployment course of that creates customized containerized environments instantly on sufferer machines.

The malware establishes communication with its operators by way of a RESTful API structure, implementing refined polling and heartbeat mechanisms that guarantee persistent connectivity whereas evading detection by way of legitimate-appearing community visitors.

Darktrace analysts recognized the malware throughout routine honeypot monitoring, discovering that the marketing campaign particularly targets AWS EC2 cases working uncovered Docker daemons.

The login UI (Supply – Darktrace)

The researchers noticed the risk actors utilizing superior assault strategies together with HTTP/2 fast reset assaults, Cloudflare under-attack mode bypasses, and large-scale HTTP flood campaigns.

These capabilities, mixed with a totally operational person interface and OpenAPI specification, point out that ShadowV2 capabilities as a complete DDoS-as-a-service platform fairly than a standard botnet, providing paying prospects the power to launch refined distributed assaults in opposition to focused infrastructure.

A snippet exhibiting the fasthttp consumer creation loop (Supply – Darktrace)

The malware’s structure reveals a regarding stage of professionalism, with the whole operation designed round a modular, service-oriented strategy that features person authentication, privilege administration, and assault limitations primarily based on subscription tiers.

This evolution represents a elementary shift in cybercrime economics, the place malicious infrastructure more and more resembles authentic software-as-a-service choices by way of person expertise, reliability, and have completeness.

Technical An infection and Deployment Mechanism

The ShadowV2 botnet employs a classy three-stage deployment course of that distinguishes it from typical Docker-based malware campaigns.

Preliminary compromise happens by way of Python scripts hosted on GitHub CodeSpaces, identifiable by way of distinctive HTTP headers together with Person-Agent: docker-sdk-python/7.1.0 and X-Meta-Supply-Shopper: github/codespaces.

These indicators reveal the attackers’ use of the Python Docker SDK library, which permits programmatic interplay with Docker daemon APIs to create and handle containerized environments on course programs.

The ballot mechanism (Supply – Darktrace)

The assault methodology deviates considerably from typical Docker exploitation patterns. As an alternative of deploying pre-built malicious photos from Docker Hub or importing customized containers, the malware first spawns a generic Ubuntu-based setup container and dynamically installs crucial instruments inside it.

This container is then dedicated as a brand new picture and deployed as a dwell container with malware arguments handed by way of environmental variables together with MASTER_ADDR and VPS_NAME identifiers.

The containerized payload consists of a Go-based ELF binary positioned at /app/deployment that implements a strong communication protocol with the command-and-control infrastructure.

Upon execution, the malware generates a singular VPS_ID by concatenating the supplied VPS_NAME with the present Unix timestamp, making certain distinct identification for every compromised system.

This identifier facilitates command routing and maintains session continuity even throughout malware restarts or reinfections.

The binary establishes two persistent communication loops: a heartbeat mechanism that transmits the VPS_ID to hxxps://shadow.aurozacloud[.]xyz/api/vps/heartbeat each second by way of POST requests, and a command polling system that queries hxxps://shadow.aurozacloud[.]xyz/api/vps/ballot/ each 5 seconds by way of GET requests.

This dual-channel strategy ensures each operational visibility for attackers and dependable command supply to compromised infrastructure, whereas sustaining the looks of authentic API visitors that may evade network-based detection mechanisms.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, AWS, Botnet, Containers, DDoS, Docker, Exploits, Infected, ShadowV2, System, Thems, Turn

Post navigation

Previous Post: Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps
Next Post: Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Related Posts

How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? Cyber Security News
Windows 11 25H2 Update Preview Released, What’s New? Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers Cyber Security News
Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Cyber Security News
Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack
  • UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
  • European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested
  • How One Bad Password Ended a 158-Year-Old Business

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
  • GeoServer Flaw Exploited in US Federal Agency Hack
  • UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports
  • European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested
  • How One Bad Password Ended a 158-Year-Old Business

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News