RondoDox Botnet Exploits React2Shell to Widen IoT Infections

RondoDox campaign weaponizes React2Shell to recruit 90,300 web apps and IoT devices—dropping miners, loaders and Mirai; patch Next.js and segment IoT.

  • A persistent nine-month campaign enrolled IoT devices and web apps into the RondoDox botnet using multiple vulnerabilities, including React2Shell (CVE-2025-55182).
  • About 90,300 vulnerable instances remain exposed globally, with 68,400 in the U.S.
  • The campaign used staged activity—reconnaissance, mass probing, and large-scale hourly deployment—and dropped miners, loaders, and a Mirai variant.
  • Defenses include patching Next.js, isolating IoT devices, deploying WAFs, monitoring processes, and blocking known C2 infrastructure.

Cybersecurity teams disclosed a nine-month campaign that recruited Internet of Things devices and web applications into the RondoDox botnet through late 2025. The activity used the critical React2Shell vulnerability (CVE-2025-55182) to gain remote code execution on exposed servers, CloudSEK said. The campaign also added older N-day flaws such as CVE-2023-1389 and CVE-2025-24893.

- Advertisement -

Data from the Shadowserver Foundation show roughly 90,300 instances vulnerable as of December 31, 2025, with 68,400 located in the U.S. Germany, France, and India followed in count.

Researchers mapped three phases of the campaign: March–April 2025 reconnaissance and manual scans; April–June daily mass probing of web apps (WordPress, Drupal, Struts2) and IoT devices like Wavlink routers; and July–early December large-scale automated hourly deployment. The abuse of React2Shell was previously flagged by Darktrace here and noted by other security firms.

In December 2025 infections, actors scanned for vulnerable Next.js servers and attempted to drop cryptocurrency miners and bot components at paths such as "/nuts/poop", "/nuts/bolts", and "/nuts/x86". The "/nuts/bolts" tool removes competing Malware and miners, clears prior campaign artifacts, and installs persistence via "/etc/crontab". As described by CloudSEK, "It continuously scans /proc to enumerate running executables and kills non-whitelisted processes every ~45 seconds, effectively preventing reinfection by rival actors."

Recommended mitigations include updating Next.js to patched versions, segmenting IoT devices into dedicated VLANs, deploying Web Application Firewalls, monitoring for suspicious process execution, and blocking known command-and-control infrastructure.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...

Tesla surges 89% in Norway; France, Sweden plunge 66/71% Dec

Tesla registrations in Norway jumped 89% in December to 5,679 vehicles.Tesla finished 2025 as...

KRX Readies for Crypto ETFs as SK Regulators Weigh Approval.

Korea Exchange says it is ready to list and trade new products such as...
- Advertisement -

Must Read

What Are Sniper Bots Used in Defi Trading?

You've heard about DeFi, but what about sniper bots? These high-speed trading tools are shaking up the crypto scene.But don't fret, you're not...
Bitcoin (BTC) $ 88,659.00 1.03%
Ethereum (ETH) $ 3,030.59 1.81%
XRP (XRP) $ 1.89 2.16%
Bittensor (TAO) $ 240.02 7.43%
Polkadot (DOT) $ 1.99 7.94%
Cardano (ADA) $ 0.362333 5.70%
Chainlink (LINK) $ 12.87 5.03%
Hyperliquid (HYPE) $ 24.39 3.97%
Monero (XMR) $ 415.05 1.77%
Hedera (HBAR) $ 0.118367 9.25%
Toncoin (TON) $ 1.72 2.56%