RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
好的,我现在要帮用户总结这篇文章的内容,控制在100字以内。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是一个持续了九个月的网络攻击活动,目标是IoT设备和Web应用,目的是组建一个名为RondoDox的僵尸网络。攻击者利用了React2Shell漏洞,这是一个CVSS评分为10.0的严重漏洞,影响了很多设备。根据统计,有9万多实例仍然容易受到攻击,其中大部分在美国。 接下来,文章提到RondoDox在2025年初出现后,通过添加新的漏洞扩大规模。攻击分为三个阶段:侦察、扫描和大规模部署。攻击者会尝试植入挖矿软件、botnet加载器和Mirai变种。他们还会清除竞争对手的恶意软件,确保自己的持久性。 最后,文章给出了防御建议:更新Next.js版本、隔离IoT设备、部署防火墙、监控可疑进程以及阻止C2基础设施。 现在我需要把这些信息浓缩到100字以内。重点包括:九个月的活动、目标设备、利用React2Shell漏洞、9万实例受影响、攻击阶段和防御措施。 可能的结构是:时间长度、目标、漏洞名称及其影响范围、攻击阶段简述以及防御建议。 确保语言简洁明了,不使用复杂的术语。 </think> 研究人员披露了一个持续九个月的网络攻击活动,针对IoT设备和Web应用组建名为RondoDox的僵尸网络。该活动利用React2Shell漏洞(CVE-2025-55182)作为初始入口,并通过三阶段逐步扩大规模。截至2025年12月,全球约9万实例仍受该漏洞影响。建议企业更新Next.js版本并加强安全防护措施以应对威胁。 2026-1-1 09:19:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

Network Security / Vulnerability

RondoDox Botnet

Cybersecurity researchers have disclosed details of a persistent nine-month-long campaign that has targeted Internet of Things (IoT) devices and web applications to enroll them into a botnet known as RondoDox.

As of December 2025, the activity has been observed leveraging the recently disclosed React2Shell (CVE-2025-55182, CVSS score: 10.0) flaw as an initial access vector, CloudSEK said in an analysis.

React2Shell is the name assigned to a critical security vulnerability in React Server Components (RSC) and Next.js that could allow unauthenticated attackers to achieve remote code execution on susceptible devices.

According to statistics from the Shadowserver Foundation, there are about 90,300 instances that remain susceptible to the vulnerability as of December 31, 2025, out of which 68,400 instances are located in the U.S., followed by Germany (4,300), France (2,800), and India (1,500).

Cybersecurity

RondoDox, which emerged in early 2025, has broadened its scale by adding new N-day security vulnerabilities to its arsenal, including CVE-2023-1389 and CVE-2025-24893. It's worth noting that the abuse of React2Shell to spread the botnet was previously highlighted by Darktrace, Kaspersky, and VulnCheck.

The RondoDox botnet campaign is assessed to have gone through three distinct phases prior to the exploitation of CVE-2025-55182 -

  • March - April 2025 - Initial reconnaissance and manual vulnerability scanning
  • April - June 2025 - Daily mass vulnerability probing of web applications like WordPress, Drupal, and Struts2, and IoT devices like Wavlink routers
  • July - early December 2025 - Hourly automated deployment on a large-scale

In the attacks detected in December 2025, the threat actors are said to have initiated scans to identify vulnerable Next.js servers, followed by attempts to drop cryptocurrency miners ("/nuts/poop"), a botnet loader and health checker ("/nuts/bolts"), and a Mirai botnet variant ("/nuts/x86") on infected devices.

"/nuts/bolts" is designed to terminate competing malware and coin miners before downloading the main bot binary from its command-and-control (C2) server. One variant of the tool has been found to remove known botnets, Docker-based payloads, artifacts left from prior campaigns, and associated cron jobs, while also setting up persistence using "/etc/crontab."

"It continuously scans /proc to enumerate running executables and kills non-whitelisted processes every ~45 seconds, effectively preventing reinfection by rival actors," CloudSEK said.

To mitigate the risk posed by this threat, organizations are advised to update Next.js to a patched version as soon as possible, segment all IoT devices into dedicated VLANs, deploy Web Application Firewalls (WAFs), monitor for suspicious process execution, and block known C2 infrastructure.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/rondodox-botnet-exploits-critical.html
如有侵权请联系:admin#unsafe.sh