Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers

RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers

Posted on January 1, 2026January 1, 2026 By CWS

Jan 01, 2026Ravie LakshmananNetwork Safety / Vulnerability
Cybersecurity researchers have disclosed particulars of a persistent nine-month-long marketing campaign that has focused Web of Issues (IoT) gadgets and net functions to enroll them right into a botnet often called RondoDox.
As of December 2025, the exercise has been noticed leveraging the not too long ago disclosed React2Shell (CVE-2025-55182, CVSS rating: 10.0) flaw as an preliminary entry vector, CloudSEK stated in an evaluation.
React2Shell is the title assigned to a vital safety vulnerability in React Server Parts (RSC) and Subsequent.js that would permit unauthenticated attackers to attain distant code execution on prone gadgets.
In response to statistics from the Shadowserver Basis, there are about 90,300 situations that stay prone to the vulnerability as of December 31, 2025, out of which 68,400 situations are positioned within the U.S., adopted by Germany (4,300), France (2,800), and India (1,500).

RondoDox, which emerged in early 2025, has broadened its scale by including new N-day safety vulnerabilities to its arsenal, together with CVE-2023-1389 and CVE-2025-24893. It is value noting that the abuse of React2Shell to unfold the botnet was beforehand highlighted by Darktrace, Kaspersky, and VulnCheck.
The RondoDox botnet marketing campaign is assessed to have gone via three distinct phases previous to the exploitation of CVE-2025-55182 –

March – April 2025 – Preliminary reconnaissance and guide vulnerability scanning
April – June 2025 – Every day mass vulnerability probing of net functions like WordPress, Drupal, and Struts2, and IoT gadgets like Wavlink routers
July – early December 2025 – Hourly automated deployment on a large-scale

Within the assaults detected in December 2025, the risk actors are stated to have initiated scans to determine weak Subsequent.js servers, adopted by makes an attempt to drop cryptocurrency miners (“/nuts/poop”), a botnet loader and well being checker (“/nuts/bolts”), and a Mirai botnet variant (“/nuts/x86”) on contaminated gadgets.
“/nuts/bolts” is designed to terminate competing malware and coin miners earlier than downloading the principle bot binary from its command-and-control (C2) server. One variant of the instrument has been discovered to take away identified botnets, Docker-based payloads, artifacts left from prior campaigns, and related cron jobs, whereas additionally organising persistence utilizing “/and many others/crontab.”
“It constantly scans /proc to enumerate operating executables and kills non-whitelisted processes each ~45 seconds, successfully stopping reinfection by rival actors,” CloudSEK stated.
To mitigate the danger posed by this risk, organizations are suggested to replace Subsequent.js to a patched model as quickly as doable, phase all IoT gadgets into devoted VLANs, deploy Net Software Firewalls (WAFs), monitor for suspicious course of execution, and block identified C2 infrastructure.

The Hacker News Tags:Botnet, Critical, Devices, Exploits, Flaw, Hijack, IoT, React2Shell, RondoDox, Servers, Web

Post navigation

Previous Post: How To Browse Faster and Get More Done Using Adapt Browser
Next Post: Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates

Related Posts

Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits The Hacker News
4 Outdated Habits Destroying Your SOC’s MTTR in 2026 4 Outdated Habits Destroying Your SOC’s MTTR in 2026 The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News
Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark