Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hot robotics startup Physical Intelligence says its new robot brain can understand tasks it hasn’t been taught

Newly discovered PowMix botnet uses randomized C2 traffic to attack Czech workers

Ban on PFAS products expands in 2026 as US state law takes effect

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Newly discovered PowMix botnet uses randomized C2 traffic to attack Czech workers
Identity

Newly discovered PowMix botnet uses randomized C2 traffic to attack Czech workers

By April 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 16, 2026Botnet/Cryptomining

Cybersecurity researchers have warned that a previously undocumented botnet called PowMix has been active in a malicious campaign targeting workers in the Czech Republic since at least December 2025.

“PowMix employs randomized command and control (C2) beacon intervals rather than persistent connections to C2 servers to evade detection of network signatures,” Cisco Talos researcher Chetan Raghuprasad said in a report published today.

“PowMix embeds encrypted heartbeat data and a unique identifier for the victim machine in the C2 URL path to mimic a legitimate REST API URL. PowMix has the ability to dynamically update new C2 domains to botnet configuration files remotely.”

The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, which activates a multi-step infection chain that drops PowMix. Specifically, it involves a Windows shortcut (LNK) that is used to launch a PowerShell loader that extracts malware embedded within an archive, decrypts it, and executes it in memory.

The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution while establishing persistence through scheduled tasks. At the same time, verify the process tree to ensure that no other instances of the same malware are running on the compromised host.

PowMix’s remote management logic allows it to process two types of commands sent from the C2 server. # If a response is not prefixed, PowMix enters an arbitrary execution mode, decrypts and executes the retrieved payload.

#KILL, initiates a self-deletion routine and erases all traces of malicious artifacts. #HOST, enable C2 migration to new server URL.

At the same time, it also opens a compliance-themed decoy document as a distraction mechanism. The decoy document references legitimate brands such as Edeka and includes compensation data and references to valid laws, potentially intended to increase brand credibility and deceive recipients such as job applicants.

Talos said this campaign has some tactical overlap with a campaign called ZipLine that Check Point revealed in late August 2025 that targeted supply chain-critical manufacturing companies using in-memory malware called MixShell.

This includes using the same ZIP-based payload delivery, persisting scheduled tasks, and exploiting Heroku for C2. However, no final payload beyond the botnet malware itself has been observed, leaving questions about its exact motivations unanswered.

“PowMix avoids persistent connections to C2 servers,” says Talos. “Instead, we implement jitter via the Get-Random PowerShell command and change the beacon interval initially between 0 and 261 seconds and then between 1,075 and 1,450 seconds. This technique attempts to prevent detection of C2 traffic through predictable network signatures.”

This disclosure comes as Bitsight uncovers an infection chain associated with the RondoDox botnet, highlighting the malware’s evolving ability to illegally mine cryptocurrencies on infected systems using XMRig in addition to its existing distributed denial of service (DDoS) attack capabilities.

The findings reveal a complete picture of actively maintained malware that offers improved evasion, increased resiliency, proactive conflict elimination, and an expanded feature set.

RondoDox can exploit over 170 known vulnerabilities in various internet-facing applications to gain initial access, drop shell scripts that perform basic anti-analysis and remove competing malware, and then drop architecture-appropriate botnet binaries.

Bitsight Principal Researcher João Godinho said the malware “implements techniques to thwart analysis through multiple checks, including the use of nanomites, renaming and deleting files, killing processes, and aggressively checking running debuggers.”

“Bots can perform DoS attacks at the internet, transport, and application layers depending on commands and arguments issued by the C2.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBan on PFAS products expands in 2026 as US state law takes effect
Next Article Hot robotics startup Physical Intelligence says its new robot brain can understand tasks it hasn’t been taught

Related Posts

Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories

April 16, 2026

[Webinar] Find and eliminate isolated non-human identities in the environment

April 16, 2026

Cisco patches four critical identity services, Webex flaw that allows code execution

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hot robotics startup Physical Intelligence says its new robot brain can understand tasks it hasn’t been taught

Newly discovered PowMix botnet uses randomized C2 traffic to attack Czech workers

Ban on PFAS products expands in 2026 as US state law takes effect

DESI completes the largest space map in history

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.