Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Botnet Exploiting React2Shell Vulnerability

RondoDox Botnet Exploiting React2Shell Vulnerability

Posted on January 2, 2026January 2, 2026 By CWS

Current RondoDox botnet enrollment assaults have been focusing on Subsequent.js servers susceptible to React2Shell, CloudSEK reviews.

The focused safety defect, tracked as CVE-2025-55182, impacts programs counting on model 19 of the favored open supply JavaScript library React, and which use React Server Parts (RSC).

Publicly disclosed on December 3, 2025, React2Shell additionally impacts frameworks that leverage React, equivalent to Subsequent.js, React Router, RedwoodSDK, and Waku.

The bug permits unauthenticated attackers to ship specifically crafted HTTP requests to React Server Perform endpoints and obtain distant code execution (RCE).

Exploitation of the flaw began inside days of public disclosure and was initially related to China-linked risk teams. Per week later, a number of risk actors had been seen focusing on susceptible situations.

Based on CloudSEK, the RondoDox botnet’s operators joined the fray throughout that timeframe, and for the previous three weeks have centered on exploiting Subsequent.js situations affected by React2Shell.

Between December 8 and 16, they had been seen scanning for susceptible servers by means of blind RCE testing. On December 13, they began deploying malicious payloads.

The RondoDox operators had been seen dropping a botnet assist framework designed to purge the host of different botnets and cryptocurrency miners, deploy the bot consumer, and set up persistence. A miner and a Mirai variant had been additionally put in on the compromised programs.Commercial. Scroll to proceed studying.

Whereas the botnet’s React2Shell exploitation exercise concerned a Linux-focused payload, RondoDox is thought for taking an exploit shotgun method to infecting units.

The primary exploitation makes an attempt related to the botnet, CloudSEK says, occurred in March 2025, whereas systematic vulnerability scanning began in early April.

The operators engaged in widespread vulnerability probing between April and June and began the bot consumer’s deployment in July.

Since then, they’ve been ensnaring internet-facing routers, IP cameras, and community home equipment into the botnet, utilizing payloads for x86, x86_64, MIPS, ARM, and PowerPC architectures.

Along with exploiting internet purposes for preliminary entry, RondoDox assaults contain credential theft and lateral motion, CloudSEK notes.

Associated: Google Sees 5 Chinese language Teams Exploiting React2Shell for Malware Supply

Associated: ‘Kimwolf’ Android Botnet Ensnares 1.8 Million Gadgets

Associated: New ‘Broadside’ Botnet Poses Danger to Delivery Firms

Associated: Exploitation of React2Shell Surges

Security Week News Tags:Botnet, Exploiting, React2Shell, RondoDox, Vulnerability

Post navigation

Previous Post: Cognizant Hit With Multiple US Class-Action Lawsuits Following TriZetto Data Breach
Next Post: The ROI Problem in Attack Surface Management

Related Posts

Scattered Spider Suspect Arrested in US Scattered Spider Suspect Arrested in US Security Week News
The UK Brings Cyberwarfare Out of the Closet The UK Brings Cyberwarfare Out of the Closet Security Week News
Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 Cybersecurity M&A Roundup: 41 Deals Announced in June 2025 Security Week News
Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Security Week News
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News
Red Hat Confirms GitLab Instance Hack, Data Theft Red Hat Confirms GitLab Instance Hack, Data Theft Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News