Article Details

Scrape Timestamp (UTC): 2025-10-13 10:19:51.748

Source: https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html

Original Article Text

Click to Toggle View

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors. Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors. The activity, described as akin to an "exploit shotgun" approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and various other network devices, according to Trend Micro. The cybersecurity company said it detected a RondoDox intrusion attempt on June 15, 2025, when the attackers exploited CVE-2023-1389, a security flaw in TP-Link Archer routers that has come under active exploitation repeatedly since it was first disclosed in late 2022. RondoDox was first documented by Fortinet FortiGuard Labs back in July 2025, detailing attacks aimed at TBK digital video recorders (DVRs) and Four-Faith routers to enlist them in a botnet for carrying out distributed denial-of-service (DDoS) attacks against specific targets using HTTP, UDP, and TCP protocols. "More recently, RondoDox broadened its distribution by using a 'loader-as-a-service' infrastructure that co-packages RondoDox with Mirai/Morte payloads – making detection and remediation more urgent," Trend Micro said. RondoDox's expanded arsenal of exploits includes nearly five dozen security flaws, out of which 18 don't have a CVE identifier assigned. The 56 vulnerabilities span various vendors such as D-Link, TVT, LILIN, Fiberhome, Linksys, BYTEVALUE, ASMAX, Brickcom, IQrouter, Ricon, Nexxt, NETGEAR, Apache, TBK, TOTOLINK, Meteobridge, Digiever, Edimax, QNAP, GNU, Dasan, Tenda, LB-LINK, AVTECH, Zyxel, Hytec Inter, Belkin, Billion, and Cisco. "The latest RondoDox botnet campaign represents a significant evolution in automated network exploitation," the company added. "It's a clear signal that the campaign is evolving beyond single-device opportunism into a multivector loader operation." Late last month, CloudSEK revealed details of a large-scale loader-as-a-Service botnet distributing RondoDox, Mirai, and Morte payloads through SOHO routers, Internet of Things (IoT) devices, and enterprise apps by weaponizing weak credentials, unsanitized inputs, and old CVEs. The development comes as security journalist Brian Krebs noted that the DDoS botnet known as AISURU is "drawing a majority of its firepower" from compromised IoT devices hosted on U.S. internet providers like AT&T, Comcast, and Verizon. One of the botnet's operators, Forky, is alleged to be based in Sao Paulo, Brazil, and is also linked to a DDoS mitigation service called Botshield. In recent months, AISURU has emerged as one of the largest and most disruptive botnets, responsible for some of the record-setting DDoS attacks seen to date. Built on the foundations of Mirai, the botnet controls an estimated 300,000 compromised hosts worldwide. The findings also follow the discovery of a coordinated botnet operation involving over 100,000 unique IP addresses from no less than 100 countries targeting Remote Desktop Protocol (RDP) services in the U.S., per GreyNoise. The activity is said to have commenced on October 8, 2025, with the majority of the traffic originating from Brazil, Argentina, Iran, China, Mexico, Russia, South Africa, Ecuador, and others. "The campaign employs two specific attack vectors – RD Web Access timing attacks and RDP web client login enumeration – with most participating IPs sharing one similar TCP fingerprint, indicating centralized control," the threat intelligence firm said.

Daily Brief Summary

MALWARE // RondoDox Botnet Exploits Over 50 Vulnerabilities Across Global Vendors

The RondoDox botnet is actively exploiting more than 50 vulnerabilities across over 30 vendors, targeting internet-exposed infrastructure such as routers, DVRs, and CCTV systems.

Trend Micro detected a RondoDox intrusion attempt in June 2025, exploiting a known flaw in TP-Link Archer routers, highlighting the ongoing risk from previously disclosed vulnerabilities.

RondoDox has evolved to use a "loader-as-a-service" model, distributing with Mirai/Morte payloads, complicating detection and increasing the urgency for remediation.

The botnet's arsenal includes nearly five dozen security flaws, with 18 lacking CVE identifiers, affecting vendors like D-Link, NETGEAR, Cisco, and Apache.

The campaign signifies a shift from single-device attacks to a multivector loader operation, indicating a sophisticated evolution in automated network exploitation.

Recent findings indicate the AISURU botnet, built on Mirai, is leveraging compromised IoT devices in the U.S. for large-scale DDoS attacks, involving 300,000 hosts globally.

Security efforts must focus on patching vulnerabilities, strengthening credentials, and monitoring for unsanitized inputs to mitigate the growing threat from such botnets.