Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/Threats/RondoDoX Botnet Exploits Critical React2Shell Vulnerability
Threats

RondoDoX Botnet Exploits Critical React2Shell Vulnerability

Jennifer sherman
Jennifer sherman
January 2, 2026 One Min Read
10 0

Exploits Critical React2Shell Vulnerability

Alright, so there’s this pretty sophisticated threat group we’ve been tracking. And lately, they’ve really kicked their campaign against organizations into high gear. How? By exploiting all the newest vulnerabilities out there. That means weaknesses in web applications and, yep, even those Internet of Things (IoT) devices.

The RondoDoX botnet, tracked through exposed command-and-control logs spanning nine months from March to December 2025, demonstrates a relentless approach to compromising enterprise infrastructure.

The malware operates through a multi-stage infection process that begins with scanning for vulnerable systems and escalates to deploying cryptominers and botnet payloads across diverse network environments.

The campaign reveals three distinct attack phases, each progressively more sophisticated than the last. Initially, threat actors conducted manual vulnerability testing on various platforms.

POST Data logger (Source - CloudSEK)
POST Data logger (Source – CloudSEK)

By April 2025, they shifted to automated daily scanning operations targeting multiple web frameworks.

The final phase, beginning in July 2025, escalated attacks to hourly deployment attempts, showcasing the attackers’ commitment to continuous exploitation and infrastructure compromise.

CloudSEK analysts identified the malware through routine scans for malicious infrastructure, uncovering six confirmed command-and-control servers with overlapping operational periods.

The researchers discovered evidence of at least ten botnet variants actively deployed across compromised systems, with command logs revealing detailed attack patterns and infrastructure usage spanning the entire campaign timeline.

The most alarming development emerged in December 2025, when threat actors began weaponizing a critical Next.js vulnerability to deploy React2Shell payloads.

Attack chain

This transition demonstrates the group’s ability to rapidly adapt and adopt newly disclosed security flaws.

The attack chain begins with identification of vulnerable servers through blind remote code execution testing, followed by deployment of ELF binaries that download malicious payloads from active command-and-control infrastructure.

The malware’s infection mechanism reveals sophisticated persistence and evasion capabilities. Once deployed, the botnet establishes persistence through cron job configuration in system files and aggressively terminates competing malware to monopolize system resources.

The payload includes cryptominers and support frameworks designed for long-term dominance on compromised hosts.

The botnet supports multiple processor architectures including x86, x86_64, MIPS, ARM, and PowerPC, with multiple fallback download mechanisms using wget, curl, tftp, and ftp protocols to ensure successful payload delivery across heterogeneous enterprise environments.

Organizations with internet-facing routers, cameras, and applications running Next.js Server Actions face immediate risk.

Network segmentation, immediate patching of vulnerable applications, Web Application Firewall deployment, and continuous monitoring for suspicious process execution in temporary directories remain essential defensive measures.

Additionally, blocking identified command-and-control infrastructure at perimeter firewalls provides critical short-term protection against active exploitation attempts.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AptAttackCryptoExploitMalwarePatchSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Fortinet Firewalls Exposed to 5-Year-Old Vulnerability

Next Post

Cardano Wallet Phishing Targets Users via Eternl Desktop

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us