Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Create Fast Growth Companies With Growth Loops

    October 20, 2025

    Ninja Prestige DualBrew System review: espresso and drip coffee don’t get easier than this

    October 19, 2025

    Bluesky adds private bookmarks | TechCrunch

    October 19, 2025
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»RondoDox Botnet Takes ‘Exploit Shotgun’ Approach
    RondoDox Botnet Takes ‘Exploit Shotgun’ Approach
    Cybersecurity

    RondoDox Botnet Takes ‘Exploit Shotgun’ Approach

    The Tech GuyBy The Tech GuyOctober 11, 2025No Comments2 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    A newly identified botnet takes a ‘shotgun’ approach to compromising devices, packing over 50 exploits targeting routers, servers, cameras, and other network products, Trend Micro reports.

    Advertisement

    Dubbed RondoDox, the botnet began activities in mid-2025 and was associated with the exploitation of CVE-2023-1389, a command injection flaw in the WAN interface of TP-Link Archer AX21 routers that was disclosed at the Pwn2Own Toronto hacking contest in 2022.

    In June, RondoDox was seen targeting CVE-2024-3721 and CVE-2024-12856, two high-severity weaknesses in TBK DVRs and Four-Faith routers, and then significantly expanding its target list.

    According to Trend Micro, the botnet is now targeting routers, DVRs, NVRs, CCTV systems, web servers, and other networking equipment from more than 30 vendors.

    RondoDox targets a total of 56 vulnerabilities, including 18 that do not have a CVE identifier assigned. Most of these are command injection bugs and a subset of them was added to the US cybersecurity agency CISA’s KEV list, which underlines the immediate need for patching.

    In late September, CloudSek warned of a 230% surge in the botnet’s attacks since mid-2025, fueled by the exploitation of weak credentials, unsanitized input, and old CVEs.

    The infected devices, the cybersecurity firm pointed out, are abused for cryptocurrency mining, distributed denial-of-service (DDoS) attacks, and for hacking into enterprise networks.

    RondoDox’s operators were seen rapidly rotating infrastructure to evade detection, and RondoDox binaries were seen being distributed alongside Mirai and Morte payloads.

    Advertisement. Scroll to continue reading.

    “More recently, RondoDox broadened its distribution by using a ‘loader-as-a-service’ infrastructure that co-packages RondoDox with Mirai/Morte payloads — making detection and remediation more urgent,” Trend Micro says.

    RondoDox targets ARM, MIPS, and various Linux architectures. It can launch DDoS attacks using HTTP, UDP, and TCP packets and emulates known gaming platforms or impersonates VPN services to hide the malicious traffic and evade detection.

    “The campaign’s shotgun approach of targeting more than 50 vulnerabilities across over 30 vendors underscores the persistent risks facing organizations that maintain internet-exposed network infrastructure without adequate security controls,” Trend Micro notes.

    Related: Exposed Docker APIs Likely Exploited to Build Botnet

    Related: RapperBot Botnet Disrupted, American Administrator Indicted

    Related: Cisco Patches Zero-Day Flaw Affecting Routers and Switches

    Related: GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

    October 12, 2025

    Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date

    October 12, 2025

    ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

    October 11, 2025

    Juniper Networks Patches Critical Junos Space Vulnerabilities

    October 11, 2025

    In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

    October 10, 2025

    Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign

    October 10, 2025
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20257 Views

    Huawei Watch GT 6 Pro review

    October 12, 20256 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Create Fast Growth Companies With Growth Loops

    October 20, 2025

    Ninja Prestige DualBrew System review: espresso and drip coffee don’t get easier than this

    October 19, 2025

    Bluesky adds private bookmarks | TechCrunch

    October 19, 2025
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2025 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.