Security WeekArchived Mar 17, 2026✓ Full text saved
The botnet has increased its activity, peaking at 15,000 exploitation attempts per day, and taking a more targeted approach. The post 174 Vulnerabilities Targeted by RondoDox Botnet appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
The RondoDox botnet’s developers have significantly increased their exploit list and are taking a more targeted approach to exploitation, Bitsight reports.
Initially detailed in the second half of last year, RondoDox has been active since at least March 2025, when security researchers observed the first exploitation attempts associated with it.
Since April 2025, the botnet’s operators engaged in systematic vulnerability scanning, mostly taking a ‘shotgun’ approach to compromising devices.
By October, it was targeting 56 vulnerabilities, including flaws without a CVE assigned, and in December, it was seen targeting React2Shell.
Now, Bitsight says the botnet’s exploit list has been expanded to 174 different vulnerabilities, as its developers are closely following vulnerability disclosures, targeting bugs before CVEs are assigned.
Furthermore, RondoDox has shifted its exploitation strategy to a more targeted approach. Instead of throwing multiple exploits at the same device, in the shotgun method observed before, they are now focusing on specific flaws that are more likely to lead to infections.
RondoDox, which shares numerous commonalities with Mirai, is also known for targeting weak credentials and unsanitized input for initial access. What sets it apart from Mirai is its focus on launching distributed denial-of-service (DDoS) attacks instead of scanning and infecting additional devices.
To expand the botnet, RondoDox’s operators scan the internet for vulnerable devices using their own infrastructure, and then proceed to deploy implants that evade detection, remove other malware, find a suitable directory to drop the main binary into, and execute it.
Bitsight’s investigation into the botnet revealed the use of over two dozen IP addresses for device exploitation, payload distribution, and bot management, including residential IPs that likely belong to compromised systems.
RondoDox’s operators are constantly adding and removing vulnerabilities from their exploit list and have been observed using as many as 49 bugs in a single day. Most of the bugs, however, are dropped immediately.
“When examining how often each vulnerability was used, a clear long-tail trend emerges. While the average vulnerability was used for 18 days, nearly half of the 174 vulnerabilities identified (84, or 48%) were exploited for just a single day. This suggests that they try vulnerabilities and act based on the success rate of each,” Bitsight notes.
According to the cybersecurity firm, the botnet’s operators appear to be closely looking at publications related to vulnerabilities, as in at least one case, they exploited the security defect two days before the public disclosure.
Although they stay up to date with new flaws, the botnet’s operators fail to properly implement the available exploits for them, Bitsight says.
The cybersecurity firm also notes that the botnet does not appear to use a loader-as-a-service for distribution and that previous reports of P2P functionality in RondoDox do not appear to be accurate.
Related: Authorities Disrupt SocksEscort Proxy Service Powered by AVrecon Botnet
Related: Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience
Related: New ‘SSHStalker’ Linux Botnet Uses Old Techniques
Related: GoBruteforcer Botnet Targeting Crypto, Blockchain Projects
WRITTEN BY
Ionut Arghire
Ionut Arghire is an international correspondent for SecurityWeek.
More from Ionut Arghire
Security Firm Executive Targeted in Sophisticated Phishing Attack
China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation
Threat Actor Targeting VPN Users in New Credential Theft Campaign
ForceMemo: Python Repositories Compromised in GlassWorm Aftermath
Critical HPE AOS-CX Vulnerability Allows Admin Password Resets
Bold Security Emerges From Stealth With $40 Million in Funding
Google Paid Out $17 Million in Bug Bounty Rewards in 2025
Onyx Security Launches With $40 Million in Funding
Latest News
Tech Giants Invest $12.5 Million in Open Source Security
UK Companies House Exposed Details of Millions of Firms
Surf AI Raises $57 Million for Agentic Security Operations Platform
Robotic Surgery Giant Intuitive Discloses Cyberattack
Google, Meta, Microsoft Among Signatories of Pact to Combat Scams
Tracebit Raises $20M for Cloud-Native Deception Technology
CISA Flags Year-Old Wing FTP Vulnerability as Exploited
AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks
Trending
Webinar: Securing Fragile OT In An Exposed World
March 10, 2026
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Register
Virtual Event: Supply Chain Security And Third-Party Risk Summit
March 18, 2026
Join the event where top security experts unpack the biggest software supply chain risks.
Register
People on the Move
Nudge Security has appointed Patrick Dillon as Chief Revenue Officer.
Arctic Wolf has named Will May as its Chief Revenue Officer.
Palo Alto Networks has named Danielle Gonzalez as its new Chief People Officer.
More People On The Move
Expert Insights
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
How To 10x Your Vulnerability Management Program In The Agentic Era
The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael)
SIM Swaps Expose A Critical Flaw In Identity Security
SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George)
Four Risks Boards Cannot Treat As Background Noise
The goal isn’t about preventing every attack but about keeping the business running when attacks succeed. (Steve Durbin)
How To Eliminate The Technical Debt Of Insecure AI-Assisted Software Development
Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable. (Matias Madou)
Flipboard
Reddit
Whatsapp
Email