Malware - New Campaigns Turn Devices Into DDoS and Mining Bots
Basically, new malware is using your devices to attack others and mine cryptocurrency.
New malware campaigns are hijacking network devices for DDoS attacks and crypto-mining. Routers and IoT devices are at risk, making immediate action essential. Protect your infrastructure to avoid exploitation.
What Happened
Network security has faced a significant blow with the emergence of two new malware strains. These strains, named CondiBot and Monaco, are designed to exploit routers, IoT devices, and enterprise network equipment. They turn these devices into weapons for large-scale DDoS attacks and covert cryptocurrency mining operations. This marks a troubling trend where threat actors are increasingly targeting the very infrastructure organizations rely on.
On March 6, 2026, security researchers discovered these malware strains, which were previously undocumented. CondiBot is built on the Mirai framework and infects Linux-based devices, enabling them to flood targeted systems with traffic. Meanwhile, Monaco uses brute-force techniques to gain access to devices and deploys Monero mining software. Both strains were not flagged by major threat intelligence platforms, indicating a concerning gap in detection capabilities.
Who's Being Targeted
The primary targets of these malware campaigns include routers, IoT devices, and enterprise network equipment. The Verizon Data Breach Investigation Report from 2025 highlighted an alarming trend: an 8x increase in vulnerability exploits targeting network devices. This indicates that attackers are not just state-sponsored groups but also financially motivated actors looking to exploit the same vulnerabilities.
The growing trend of targeting network infrastructure poses risks for all organizations. With many devices unable to run traditional security agents, attackers can operate undetected for extended periods, making it easier for them to harvest compute power or prepare for larger attacks.
Signs of Infection
Identifying an infection from these malware strains can be challenging. Once CondiBot infects a device, it employs various methods to ensure its persistence. It disables reboot utilities and connects to a command-and-control server, waiting for attack commands. This stealthy approach allows it to maintain control over compromised systems while eliminating competing botnets.
Organizations may notice unusual outbound traffic or unexpected processes running on their network appliances. These signs can indicate that devices are being used for malicious purposes, such as launching DDoS attacks or mining cryptocurrency without the owner's knowledge.
How to Protect Yourself
To mitigate the risks posed by these malware strains, organizations should take immediate action. Here are some recommended steps:
- Enforce strong, unique SSH credentials and disable default passwords on all internet-facing devices.
- Implement firmware integrity monitoring for routers, firewalls, and IoT equipment.
- Apply patches as quickly as possible, given that exploit timelines can be as short as zero days.
- Monitor for unusual outbound traffic and unexpected processes on network appliances.
By following these guidelines, organizations can enhance their security posture and reduce the likelihood of falling victim to these emerging threats.
Cyber Security News