Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Data breach at government tech giant Conduent balloon affects millions more Americans

Fundamental raises $255 million in Series A for new big data analytics initiative

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » RondoDox botnet exploits critical flaw in React2Shell to hijack IoT devices and web servers
Identity

RondoDox botnet exploits critical flaw in React2Shell to hijack IoT devices and web servers

userBy userJanuary 1, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 1, 2026Ravi LakshmananNetwork security/vulnerabilities

RondoDox botnet

Cybersecurity researchers have revealed details of an ongoing nine-month campaign targeting Internet of Things (IoT) devices and web applications to enroll them in a botnet known as RondoDox.

As of December 2025, CloudSEK has observed activity leveraging the recently revealed flaw in React2Shell (CVE-2025-55182, CVSS score: 10.0) as an initial access vector, CloudSEK said in its analysis.

React2Shell is the name given to a critical security vulnerability in React Server Components (RSC) and Next.js. This vulnerability could allow an unauthenticated attacker to execute remote code on a susceptible device.

According to statistics from the Shadowserver Foundation, as of December 31, 2025, approximately 90,300 instances remain affected by this vulnerability, with 68,400 in the United States, followed by Germany (4,300), France (2,800), and India (1,500).

cyber security

Emerging in early 2025, RondoDox has expanded by adding new N-day security vulnerabilities to its arsenal, including CVE-2023-1389 and CVE-2025-24893. It is worth noting that the exploitation of React2Shell to spread botnets has previously been noted by Darktrace, Kaspersky, and VulnCheck.

The RondoDox botnet campaign is assessed to have gone through three different stages before exploiting CVE-2025-55182.

March-April 2025 – Initial reconnaissance and manual vulnerability scans April-June 2025 – Daily large-scale vulnerability investigations of web applications such as WordPress, Drupal, Struts2, and IoT devices such as Wavlink routers July-early December 2025 – Large-scale automated deployments conducted hourly

In an attack detected in December 2025, the attackers allegedly initiated a scan to identify vulnerable Next.js servers and then attempted to drop a cryptocurrency miner (‘/nuts/poop’), a botnet loader and health checker (‘/nuts/bolts’), and a Mirai botnet variant (‘/nuts/x86’) onto infected devices.

“/nuts/bolts” is designed to terminate competing malware and coin miners before downloading the main bot binary from a command and control (C2) server. One variant of this tool was found to remove known botnets, Docker-based payloads, artifacts left by previous campaigns, and associated cron jobs while setting persistence using ‘/etc/crontab’.

“It continuously scans /proc to enumerate running executables and kills non-whitelisted processes approximately every 45 seconds, effectively preventing reinfection by rivals,” CloudSEK said.

To reduce the risk posed by this threat, we recommend that organizations update Next.js to a patched version as soon as possible, segment all IoT devices into dedicated VLANs, deploy a web application firewall (WAF), monitor suspicious process execution, and block known C2 infrastructure.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNext generation fluorine-free fire extinguishing solution
Next Article January’s ‘Wolf Supermoon’: How to watch the full moon rise with Jupiter this weekend
user
  • Website

Related Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

February 5, 2026

Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

February 5, 2026

Buyer’s Guide to AI Usage Control

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

Data breach at government tech giant Conduent balloon affects millions more Americans

Fundamental raises $255 million in Series A for new big data analytics initiative

Eleven Lab CEO: Voice is the next interface for AI

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.