Botnet Loader-as-a-Service Infrastructure Distributing RondoDoX and Mirai Payloads
A sophisticated botnet operation employing a Loader-as-a-Service model was uncovered through exposed command and control logs spanning six months. The campaign systematically targets SOHO routers, IoT devices, and enterprise applications through command injection vulnerabilities in web interfaces. Key attack vectors include exploiting unsanitized POST parameters, leveraging default credentials, and targeting known CVEs in various systems. The operation showed a 230% attack spike from July-August 2025, deploying multi-architecture malware including Morte binaries and cryptomining payloads. With rapid infrastructure rotation and diverse malware, the threat is evolving rapidly, necessitating early detection and robust defense measures.
Pulse ID: 68d5ce6bb2658315c0cc3890
Pulse Link: https://otx.alienvault.com/pulse/68d5ce6bb2658315c0cc3890
Pulse Author: AlienVault
Created: 2025-09-25 23:21:15
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CryptoMining #CyberSecurity #InfoSec #IoT #Malware #Mirai #OTX #OpenThreatExchange #RAT #bot #botnet #AlienVault