Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Botnet Expands to 174 Vulnerabilities

RondoDox Botnet Expands to 174 Vulnerabilities

Posted on March 17, 2026 By CWS

The RondoDox botnet has significantly broadened its scope, now targeting 174 vulnerabilities, according to a recent report by Bitsight. This marks a substantial increase from its previous activity, as the botnet’s developers refine their approach to exploiting security flaws.

Evolution of RondoDox Attacks

Initially observed in March 2025, RondoDox began its operations by executing widespread vulnerability scans. By the end of that year, the botnet was known to target 56 vulnerabilities, including some without CVE identifiers. Its focus then included exploiting vulnerabilities like React2Shell.

Bitsight now reports that RondoDox’s approach has shifted significantly. Rather than employing a broad, indiscriminate attack strategy, its operators are now concentrating on specific vulnerabilities that present a higher likelihood of successful exploitation.

Strategic Targeting and Techniques

RondoDox shares several traits with the Mirai botnet, particularly in its initial attack methods that involve exploiting weak credentials and unsanitized inputs. Unlike Mirai, however, RondoDox prioritizes launching distributed denial-of-service (DDoS) attacks over simply expanding its network of infected devices.

To facilitate its operations, RondoDox scans the internet for exposed devices, employing proprietary infrastructure to deploy malware implants designed to evade detection. These implants not only remove existing malware competitors but also establish a secure environment for executing their payload.

Ongoing Adaptation and Challenges

Bitsight’s investigation reveals that the botnet’s management leverages over 24 IP addresses for various tasks, including device exploitation and command distribution. Notably, the botnet’s operators frequently update their list of targeted vulnerabilities, sometimes exploiting up to 49 different flaws in a single day. However, they often discard most vulnerabilities quickly.

Interestingly, while RondoDox remains vigilant in monitoring the latest vulnerability disclosures, it struggles with effectively implementing some of these exploits. This suggests a trial-and-error approach, with the botnet’s operators continuously testing and adapting based on their success rates.

Despite its evolving strategies, Bitsight clarifies that RondoDox does not utilize loader-as-a-service for distribution, and prior assumptions about its peer-to-peer functionalities are unfounded.

Related articles highlight other cybersecurity threats, including disruptions in services like SocksEscort and the emergence of new botnets such as Aeternum and SSHStalker, underscoring the dynamic nature of cyber threats.

Security Week News Tags:BitSight, Botnet, cyber attacks, Cybersecurity, DDoS attacks, Exploitation, internet security, Malware, Mirai, network security, RondoDox, security research, security threats, Vulnerabilities, vulnerability scanning

Post navigation

Previous Post: Phishing Tactics Exploit Safe Links with Complex URL Rewrites
Next Post: PylangGhost RAT Targets Developers via npm Packages

Related Posts

UK Student Sentenced to Prison for Selling Phishing Kits UK Student Sentenced to Prison for Selling Phishing Kits Security Week News
160,000 Impacted by Valsoft Data Breach 160,000 Impacted by Valsoft Data Breach Security Week News
West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach West Virginia Credit Union Notifying 187,000 People Impacted by 2023 Data Breach Security Week News
Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks Chinese APT Exploits Unpatched Windows Flaw in Recent Attacks Security Week News
Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers Taiwan Cyber Firm Confirms Exploitation by Chinese Hackers Security Week News
From Ex Machina to Exfiltration: When AI Gets Too Curious From Ex Machina to Exfiltration: When AI Gets Too Curious Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices
  • Intuitive Reports Cyberattack Affecting Data Security
  • PylangGhost RAT Targets Developers via npm Packages
  • RondoDox Botnet Expands to 174 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices
  • Intuitive Reports Cyberattack Affecting Data Security
  • PylangGhost RAT Targets Developers via npm Packages
  • RondoDox Botnet Expands to 174 Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News