Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Posted on July 8, 2025July 8, 2025 By CWS

Cybersecurity researchers are calling consideration to a malware marketing campaign that is concentrating on safety flaws in TBK digital video recorders (DVRs) and 4-Religion routers to rope the gadgets into a brand new botnet referred to as RondoDox.
The vulnerabilities in query embrace CVE-2024-3721, a medium-severity command injection vulnerability affecting TBK DVR-4104 and DVR-4216 DVRs, and CVE-2024-12856, an working system (OS) command injection bug affecting 4-Religion router fashions F3x24 and F3x36.Many of those gadgets are put in in crucial environments like retail shops, warehouses, and small workplaces, the place they usually go unmonitored for years. That makes them ideally suited targets—simple to take advantage of, laborious to detect, and often uncovered on to the web via outdated firmware or misconfigured ports.
It is value noting that each one three safety defects have been repeatedly weaponized by menace actors to deploy totally different Mirai botnet variants in current months.
“Each [the security flaws] have been publicly disclosed and are actively being focused, posing severe dangers to machine safety and total community integrity,” Fortinet FortiGuard Labs researcher Vincent Li stated.

The cybersecurity firm stated it first recognized an ELF binary for RondoDox in September 2024, with the malware able to mimicking visitors from gaming platforms or VPN servers flying underneath the radar.What makes RondoDox particularly harmful is not simply the machine takeover—it is how the attackers repurpose that entry. As an alternative of utilizing contaminated gadgets as typical botnet nodes, they weaponize them as stealth proxies to cover command-and-control visitors, perform layered scams, or amplify DDoS-for-hire campaigns that mix monetary fraud with infrastructure disruption.
Evaluation of RondoDox artifacts signifies that it was initially distributed to focus on Linux-based working methods operating on ARM and MIPS architectures, earlier than being distributed through a shell script downloader that may goal different Linux architectures like Intel 80386, MC68000, MIPS R3000, PowerPC, SuperH, ARCompact, x86-64, and AArch64.
The shell script, as soon as launched, instructs the sufferer host to disregard SIGINT, SIGQUIT, and SIGTERM alerts which might be used to terminate processes in Unix-like working methods, and checks for writable paths throughout numerous paths resembling /dev, /dev/shm, the sufferer consumer’s dwelling listing, /mnt, /run/consumer/0, /var/log, /var/run, /var/tmp, and /knowledge/native/tmp.
Within the remaining step, the RondoDox malware is downloaded and executed onto the host, and clears the command execution historical past to clear traces of the malicious exercise. The botnet payload, for its half, proceeds to arrange persistence on the machine to make sure that it is mechanically launched following a system reboot.
It is also designed to scan the record of operating processes and terminate any course of associated to community utilities (e.g., wget and curl), system evaluation instruments (e.g., Wireshark and gdb), or different malware (e.g., cryptominers or Redtail variants) in order to keep up operational stealth.

This strategy displays a rising development in botnet design the place menace actors use multi-architecture droppers, DoH-based C2 decision, and XOR-encrypted payloads to bypass legacy IDS guidelines. As a part of a broader class of evasive Linux malware, RondoDox sits alongside threats like RustoBot and Mozi, forming a brand new wave of adaptable botnets constructed to take advantage of poor IoT hygiene and weak router hardening.Moreover, RondoDox scans a number of widespread Linux executable directories, resembling /usr/sbin, /usr/bin, /usr/native/bin, and /usr/native/sbin, and renames legit executables with random characters with an intent to inhibit restoration efforts. The modified file names are listed beneath –

iptables – jsuJpf
ufw – nqqbsc
passwd – ahwdze
chpasswd – ereghx
shutdown – hhrqwk
poweroff – dcwkkb
halt – cjtzgw
reboot – gaajct

As soon as the setup course of is full, the malware contacts an exterior server (83.150.218[.]93) to obtain instructions to carry out distributed denial-of-service (DDoS) assaults towards particular targets utilizing HTTP, UDP, and TCP protocols.
“To evade detection, it disguises malicious visitors by emulating well-liked video games and platforms resembling Valve, Minecraft, Darkish and Darker, Roblox, DayZ, Fortnite, GTA, in addition to instruments like Discord, OpenVPN, WireGuard, and RakNet,” Fortinet stated.
“Past gaming and chat protocols, RondoDox may also mimic {custom} visitors from tunneling and real-time communication providers, together with WireGuard, OpenVPN variants (e.g., openvpnauth, openvpncrypt, openvpntcp), STUN, DTLS, and RTC.”
In impersonating visitors related to legit instruments, the concept is to mix in with regular exercise and make it difficult for defenders to detect and block it.
“RondoDox is a complicated and rising malware menace that employs superior evasion methods, together with anti-analysis measures, XOR-encoded configuration knowledge, custom-built libraries, and a sturdy persistence mechanism,” Li stated. “These capabilities permit it to stay undetected and preserve long-term entry on compromised methods.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Attacks, Botnet, DDoS, DVRs, Exploits, Flaws, FourFaith, Launch, RondoDox, Routers, TBK

Post navigation

Previous Post: SAP’s July 2025 Patch Day
Next Post: 5 Ways Identity-based Attacks Are Breaching Retail

Related Posts

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine The Hacker News
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users The Hacker News
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News
Top 10 Best Practices for Effective Data Protection The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Legitimate Shellter Pen-Testing Tool Used in Malware Attacks
  • Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords
  • How To Defend Against These Phishing Kit Attacks 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Releases Cumulative Update for Windows 10 With July Patch Tuesday 2025
  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Legitimate Shellter Pen-Testing Tool Used in Malware Attacks
  • Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords
  • How To Defend Against These Phishing Kit Attacks 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News