Malware & RansomwareHIGH

RondoDox Botnet - Expands Targets to 174 Vulnerabilities

🎯

Basically, a bad botnet is attacking many weaknesses in devices every day.

Quick Summary

RondoDox botnet is ramping up attacks, targeting 174 vulnerabilities with 15,000 daily exploit attempts. This surge poses significant risks to various devices globally. Organizations must act quickly to defend against these threats.

How It Works

The RondoDox botnet has evolved into a formidable threat by targeting 174 vulnerabilities. This botnet is responsible for up to 15,000 daily exploit attempts, indicating a focused and strategic campaign. Researchers at Bitsight have tracked these activities and identified various indicators, such as User-Agent strings, to map the botnet's operations. The botnet first came to light in June 2025, exploiting vulnerabilities in devices like TP-Link routers.

Initially, RondoDox exploited a range of vulnerabilities, but it has shifted towards a more refined approach. The botnet operators have shown a pattern of adopting newly disclosed vulnerabilities quickly, often within weeks of their announcement. This agility allows them to stay ahead of defenses, making it critical for organizations to remain vigilant.

Who's Being Targeted

RondoDox is not picky; it targets a wide array of devices, including DVRs, NVRs, CCTV systems, and web servers. The botnet has exploited vulnerabilities across various device types, indicating a broad attack surface. The researchers noted that nearly half of the 174 flaws were used only once, suggesting rapid testing and selection processes by the operators.

The botnet's activity has been observed in waves, with periods of broad testing followed by phases where specific vulnerabilities are exploited for longer durations. This dynamic approach allows RondoDox to maximize its impact while minimizing detection risks.

Signs of Infection

Organizations should be alert for signs of RondoDox activity, which may include unusual network traffic patterns or spikes in exploit attempts. The botnet's ability to mimic legitimate traffic, such as gaming or VPN connections, makes it particularly challenging to detect. Additionally, the inconsistent execution of some exploits may lead to failed attacks, which can also serve as indicators of potential infection.

Monitoring for indicators of compromise (IoCs) related to the botnet can help organizations identify and respond to threats promptly. Security teams should utilize threat intelligence feeds to stay updated on the latest RondoDox tactics and techniques.

How to Protect Yourself

To defend against the RondoDox botnet, organizations must prioritize patching known vulnerabilities. Regularly updating software and firmware across all devices is essential to mitigate the risk of exploitation. Implementing network segmentation can also help limit the impact of a potential breach.

Moreover, employing advanced threat detection solutions can enhance visibility into network activities. Organizations should also conduct regular security assessments to identify and remediate vulnerabilities before they can be exploited by botnets like RondoDox. Staying informed about emerging threats and adapting security strategies accordingly is vital in this ever-evolving landscape.

🔒 Pro insight: RondoDox's rapid adaptation to newly disclosed vulnerabilities highlights the need for proactive vulnerability management in network defenses.

Original article from

Security Affairs · Pierluigi Paganini

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - Android OS Attack Bypasses Mobile Payment Security

A new Android attack technique is hijacking payment apps and bypassing security. Users are at risk of unauthorized transactions and fraud. Experts recommend stronger verification methods to combat this threat.

Infosecurity Magazine·
HIGHMalware & Ransomware

Warlock Ransomware - New Post-Exploitation Techniques Revealed

The Warlock Ransomware Group has ramped up its tactics with new post-exploitation techniques. This poses a serious threat to organizations, especially those with weak security. Awareness and proactive measures are crucial to combat these evolving threats.

Dark Reading·
HIGHMalware & Ransomware

LeakNet Ransomware - New ClickFix Tactics Uncovered

LeakNet ransomware is using ClickFix tactics via hacked sites to trick users into running harmful commands. This new strategy broadens their reach, putting many at risk. Stay informed and protect your systems against these evolving threats.

The Hacker News·
HIGHMalware & Ransomware

Malware - Attackers Use SEO Poisoning to Steal VPN Credentials

Storm-2561 is stealing VPN credentials through SEO poisoning. This attack targets enterprise employees searching for VPN tools, leading them to fake software. The implications are serious, as stolen credentials can enable unauthorized access to corporate networks.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Six Packagist Themes Distribute Trojanized jQuery

A supply chain attack has compromised OphimCMS with six malicious themes. These themes contain trojanized jQuery, posing risks to developers and users alike. Immediate action is required to secure affected systems and protect sensitive data.

Cyber Security News·
HIGHMalware & Ransomware

LeakNet Ransomware - Stealthy Attacks Using ClickFix Technique

LeakNet ransomware gang is using ClickFix for stealthy attacks. This new tactic targets corporate environments, increasing the risk of data breaches. Organizations must stay vigilant.

BleepingComputer·