Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service

Posted on September 23, 2025September 23, 2025 By CWS

Cybersecurity researchers have disclosed particulars of a brand new botnet that prospects can lease entry to conduct distributed denial-of-service (DDoS) assaults in opposition to targets of curiosity.
The ShadowV2 botnet, based on Darktrace, predominantly targets misconfigured Docker containers on Amazon Internet Companies (AWS) cloud servers to deploy a Go-based malware that turns contaminated techniques into assault nodes and co-opt them into a bigger DDoS botnet. The cybersecurity firm stated it detected the malware focusing on its honeypots on June 24, 2025.
“On the middle of this marketing campaign is a Python-based command-and-control (C2) framework hosted on GitHub Codespaces,” safety researcher Nathaniel Invoice stated in a report shared with The Hacker Information.
“What units this marketing campaign aside is the sophistication of its assault toolkit. The menace actors make use of superior strategies akin to HTTP/2 Fast Reset, a Cloudflare below assault mode (UAM) bypass, and large-scale HTTP floods, demonstrating a functionality to mix distributed denial-of-service (DDoS) methods with focused exploitation.”
The exercise is notable for incorporating a Python-based spreader module to breach Docker daemons, primarily these working on AWS EC2, whereas the Go-based distant entry trojan (RAT) permits command execution and communication with its operators utilizing the HTTP protocol. ShadowV2 has been described by the authors as an “superior assault platform.”

Campaigns focusing on uncovered Docker cases are recognized to usually leverage the entry to both drop a customized picture or leverage an present picture on Docker Hub to deploy the mandatory payloads. Nevertheless, ShadowV2 takes a barely completely different method by first spawning a generic setup container from an Ubuntu picture and putting in varied instruments in it.
A picture of the created container is then constructed and deployed as a dwell container. It is presently not recognized why this technique was chosen by the attackers, though Darktrace stated it is doable that they’re attempting to keep away from leaving any forensic artifacts by carrying it out instantly on the sufferer machine.

The container paves the best way for the execution of a Go-based ELF binary, which establishes communication with a C2 server (“shadow.aurozacloud[.]xyz”) to periodically ship a heartbeat message to the operators in addition to ballot an endpoint on the server for brand spanking new instructions.
It additionally incorporates options to conduct HTTP/2 Fast Reset assaults versus a standard HTTP flood and sidestep Cloudflare’s Underneath Assault mode by utilizing the ChromeDP device to resolve the JavaScript problem introduced to customers and procure the clearance cookie to be used in subsequent requests. That stated, the bypass is unlikely to work on condition that these challenges are explicitly designed to dam headless browser visitors.
Additional evaluation of C2 infrastructure has discovered that the server is hosted behind Cloudflare to hide its true origins. It additionally makes use of FastAPI and Pydantic, and helps a login panel and operator interface, indicating that the device is being developed with the concept of providing a “DDoS-for-Rent” service.
The API endpoints permit operators so as to add, replace, or delete customers, configure the kind of assaults these customers can execute, present a listing of endpoints from which the assault needs to be launched, and exclude a listing of web sites from being focused.
“By leveraging containerization, an in depth API, and with a full consumer interface, this marketing campaign reveals the continued growth of cybercrime-as-a-service,” Invoice stated. “The power to ship modular performance by means of a Go-based RAT and expose a structured API for operator interplay highlights how refined some menace actors are.”
The disclosure comes as F5 Labs stated it detected an internet scanning botnet that makes use of Mozilla-related browser consumer brokers to focus on internet-exposed techniques for recognized safety flaws. Up to now, the botnet is alleged to have used 11,690 completely different Mozilla Person-Agent strings for its scans.

It additionally comes as Cloudflare stated it autonomously blocked hyper-volumetric DDoS assaults that peaked at 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps), respectively, based on a submit shared on X right now. The DDoS assault, the biggest ever recorded thus far, lasted solely 40 seconds.

Earlier this month, the online infrastructure firm revealed it had mitigated a record-setting volumetric distributed denial-of-service (DDoS) assault that peaked at 11.5 terabits per second (Tbps) and lasted solely about 35 seconds.
Chinese language safety agency QiAnXin XLab, in a technical report final week, stated the botnet often known as AISURU is answerable for the assault. A variant of AIRASHI, it has contaminated practically 300,000 units, most of that are routers and safety cameras. The botnet, per the corporate, is managed by three people – Snow, Tom, and Forky – who handle growth, vulnerability integration, and gross sales, respectively.
Current iterations of the malware embrace a modified RC4 algorithm to decrypt supply code strings, conduct pace checks to search out the lowest-latency server, and steps to examine compromised units to find out the presence of community utilities like tcpdump, Wireshark, in addition to virtualization frameworks like VMware, QEMU, VirtualBox, and KVM.
“The AISURU botnet has launched assaults worldwide, spanning a number of industries,” XLab famous. “Its major targets have been positioned in areas akin to China, the USA, Germany, the UK, and Hong Kong. The brand new samples help not solely DDoS assaults but additionally Proxy performance. As world legislation enforcement will increase strain on cybercrime, demand for anonymization providers is rising.”

The Hacker News Tags:AWS, Botnet, Containers, DDoSforHire, Docker, Exploits, Misconfigured, Service, ShadowV2

Post navigation

Previous Post: Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited
Next Post: Why CISOs Must Rethink Incident Remediation

Related Posts

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages The Hacker News
A Look Inside Pillar’s AI Security Platform The Hacker News
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files The Hacker News
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks The Hacker News
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines The Hacker News
Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack
  • SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices
  • 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
  • SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
  • Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack
  • SonicWall Releases Firmware Update to Remove Rootkit Malware ‘OVERSTEP’ from SMA Devices
  • 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
  • SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
  • Unit 221B Raises $5 Million for Threat Intel Aiding Hacker Arrests 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News