Article Details
Scrape Timestamp (UTC): 2025-10-09 17:22:51.649
Original Article Text
Click to Toggle View
RondoDox botnet targets 56 n-day flaws in worldwide attacks. A new large-scale botnet called RondoDox is targeting 56 vulnerabilities in more than 30 distinct devices, including flaws first disclosed during Pwn2Own hacking competitions. The attacker focuses on a wide range of exposed devices, including DVRs, NVRs, CCTV systems, and web servers and have been active since June. The RondoDox botnet leverages what Trend Micro researchers call an “exploit shotgun” strategy, where numerous exploits are used simultaneously to maximize the infections, even if the activity is very noisy. Since FortiGuard Labs discovered RondoDox, the botnet appears to have expanded the list of exploited vulnerabilities, which included CVE-2024-3721 and CVE-2024-12856. Mass n-day exploitation In a report today, Trend Micro says that RondoDox exploits CVE-2023-1389, a flaw in the TP-Link Archer AX21 Wi-Fi router that was originally demonstrated at Pwn2Own Toronto 2022. Pwn2Own is a hacking competition organized twice a year by Trend Micro's Zero Day Initiative (ZDI), where white-hat teams demonstrate exploits for zero-day vulnerabilities in widely used products. The security researchers note that the botnet developer pay close attention to exploits demonstrated during Pwn2Own events, and move quickly to weaponize them, as Mirai did with CVE-2023-1389 in 2023. Below is a list of post-2023 n-day flaws RondoDox includes in its arsenal: Older flaws, especially in devices that reached end of life, are a significant risk as they are more likely to remain unpatched. More recent ones in supported hardware are equally dangerous since many users tend to ignore firmware updates after setting up the devices. Trend Micro also found that RondoDox incorporates exploits for 18 command injection flaws that have not been assigned a vulnerability ID (CVE). They impact D-Link NAS units, TVT and LILIN DVRs, Fiberhome, ASMAX, and Linksys routers, Brickcom cameras, and other unidentified endpoints. To protect against RondoDox and other botnet attacks, apply the latest available firmware updates for your device and replace EoL equipment. It is also recommended to segment your network to isolate critical data from internet-facing IoTs, or from guest connections, and replace default credentials with secure passwords. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy
Daily Brief Summary
The RondoDox botnet is actively targeting 56 vulnerabilities across over 30 device types, including DVRs, NVRs, CCTV systems, and web servers, since June.
Utilizing an "exploit shotgun" strategy, RondoDox deploys multiple exploits simultaneously, increasing infection rates despite generating significant network noise.
The botnet has expanded its arsenal to include vulnerabilities such as CVE-2024-3721 and CVE-2024-12856, with a focus on n-day flaws from Pwn2Own competitions.
RondoDox exploits older, unpatched vulnerabilities in end-of-life devices and newer flaws in supported hardware, posing a persistent threat to unupdated systems.
Trend Micro identified 18 additional command injection vulnerabilities in devices like D-Link NAS units and Linksys routers, lacking official CVE assignments.
To mitigate risks, organizations should apply the latest firmware updates, replace end-of-life equipment, and secure networks by segmenting critical data and changing default credentials.
The botnet's rapid adaptation of Pwn2Own exploits signals a need for vigilance and proactive patch management to safeguard against evolving threats.