RondoDox IoT Botnet Grows to 56 Vulnerabilities in Intense Campaign
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Expansion of the RondoDox IoT Botnet Campaign
- The RondoDox IoT botnet now targets 56 vulnerabilities across over 30 different vendors.
- This botnet employs an “exploit shotgun” technique to breach targets.
- The vulnerabilities targeted include command injection, path traversal, and memory corruption.
- RondoDox imitates traffic from well-known gaming and VPN services to avoid detection.
- It is distributed using a loader-as-a-service (LaaS) model.
- Systems targeted encompass consumer gadgets and enterprise software like Oracle WebLogic.
- The malware is compatible with multiple Linux architectures.
Evolving Strategies and Tactics of RondoDox
Initially focused on only two vulnerabilities, RondoDox has greatly broadened its attack landscape, now compromising 56 vulnerabilities across more than 30 vendors. This expansion is defined by the “exploit shotgun” method, wherein multiple exploits are deployed simultaneously to identify successful points of compromise.
Exploitation Techniques and Vulnerabilities
The botnet’s toolkit comprises an impressive selection of exploits, featuring 50 command injection vulnerabilities, two path traversal issues, as well as examples of buffer overflow, authentication bypass, and memory corruption. Significantly, RondoDox also takes advantage of legacy vulnerabilities, including the well-known Shellshock bug from a decade ago.
Persistence and Evasion Strategies
RondoDox utilizes advanced methods to ensure persistence and evade detection. It mimics authentic traffic from gaming services and VPNs, camouflaging its actions as regular network activity. The malware alters system startup files and creates crontab entries to ensure its continued operation on compromised devices.
Loader-as-a-Service Distribution
Distributed via a loader-as-a-service (LaaS) framework, the botnet is bundled with other malicious payloads such as Mirai and Morte. This framework allows for extensive distribution, equipping attackers with a comprehensive botnet panel for managing malicious requests.
Broadened Attack Vectors
RondoDox’s attack methods encompass both consumer and enterprise devices, including Oracle WebLogic servers, WordPress, and vBulletin systems. The malware is designed to support various Linux architectures, enhancing its potential reach across multiple devices and platforms.
Conclusion
RondoDox signifies a notable advancement in IoT botnet operations, demonstrating its capacity to exploit a diverse array of vulnerabilities across many vendors. Its unique distribution strategies and advanced evasion techniques render it a significant threat to both personal and organizational networks.