Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Botnet Expands to 174 Vulnerabilities

RondoDox Botnet Expands to 174 Vulnerabilities

Posted on March 17, 2026 By CWS

The RondoDox botnet has significantly broadened its scope, now targeting 174 vulnerabilities, according to a recent report by Bitsight. This marks a substantial increase from its previous activity, as the botnet’s developers refine their approach to exploiting security flaws.

Evolution of RondoDox Attacks

Initially observed in March 2025, RondoDox began its operations by executing widespread vulnerability scans. By the end of that year, the botnet was known to target 56 vulnerabilities, including some without CVE identifiers. Its focus then included exploiting vulnerabilities like React2Shell.

Bitsight now reports that RondoDox’s approach has shifted significantly. Rather than employing a broad, indiscriminate attack strategy, its operators are now concentrating on specific vulnerabilities that present a higher likelihood of successful exploitation.

Strategic Targeting and Techniques

RondoDox shares several traits with the Mirai botnet, particularly in its initial attack methods that involve exploiting weak credentials and unsanitized inputs. Unlike Mirai, however, RondoDox prioritizes launching distributed denial-of-service (DDoS) attacks over simply expanding its network of infected devices.

To facilitate its operations, RondoDox scans the internet for exposed devices, employing proprietary infrastructure to deploy malware implants designed to evade detection. These implants not only remove existing malware competitors but also establish a secure environment for executing their payload.

Ongoing Adaptation and Challenges

Bitsight’s investigation reveals that the botnet’s management leverages over 24 IP addresses for various tasks, including device exploitation and command distribution. Notably, the botnet’s operators frequently update their list of targeted vulnerabilities, sometimes exploiting up to 49 different flaws in a single day. However, they often discard most vulnerabilities quickly.

Interestingly, while RondoDox remains vigilant in monitoring the latest vulnerability disclosures, it struggles with effectively implementing some of these exploits. This suggests a trial-and-error approach, with the botnet’s operators continuously testing and adapting based on their success rates.

Despite its evolving strategies, Bitsight clarifies that RondoDox does not utilize loader-as-a-service for distribution, and prior assumptions about its peer-to-peer functionalities are unfounded.

Related articles highlight other cybersecurity threats, including disruptions in services like SocksEscort and the emergence of new botnets such as Aeternum and SSHStalker, underscoring the dynamic nature of cyber threats.

Security Week News Tags:BitSight, Botnet, cyber attacks, Cybersecurity, DDoS attacks, Exploitation, internet security, Malware, Mirai, network security, RondoDox, security research, security threats, Vulnerabilities, vulnerability scanning

Post navigation

Previous Post: Phishing Tactics Exploit Safe Links with Complex URL Rewrites
Next Post: PylangGhost RAT Targets Developers via npm Packages

Related Posts

Predatory Sparrow Burns  Million on Iranian Crypto Exchange in Cyber Shadow War Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War Security Week News
AI Threats Loom: CISOs Urged to Strengthen Cybersecurity AI Threats Loom: CISOs Urged to Strengthen Cybersecurity Security Week News
User Data Compromised in SoundCloud Hack  User Data Compromised in SoundCloud Hack  Security Week News
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit Security Week News
Langflow Vulnerability Exploited Rapidly After Disclosure Langflow Vulnerability Exploited Rapidly After Disclosure Security Week News
German Authorities Take Down Crypto Swapping Service eXch German Authorities Take Down Crypto Swapping Service eXch Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark