Particle.news

Download on the App Store

RondoDox Botnet Blasts 56 N-Day Flaws Across 30+ Vendors After Late-September Exploit Surge

Researchers warn the campaign now uses a loader-for-hire model to push Mirai-family payloads to unpatched devices.

Overview

  • Trend Micro’s Zero Day Initiative details an “exploit shotgun” campaign hitting 56 vulnerabilities across routers, cameras, DVRs and web servers from more than 30 vendors.
  • Observed activity peaked between September 22 and 24, and researchers say they have not seen new exploit events since the 24th.
  • Multi-architecture loaders install Mirai variants that give attackers remote control and enable large-scale DDoS operations.
  • The toolkit includes 18 unassigned command-injection flaws affecting products such as D-Link NAS units, TVT and LILIN DVRs, Fiberhome and ASMAX routers, and Brickcom cameras.
  • Distribution broadened through a loader-as-a-service co-packaging RondoDox with Mirai and Morte, with FortiGuard earlier linking CVE-2024-3721 and CVE-2024-12856; researchers advise applying firmware updates, replacing end-of-life gear, segmenting networks, and changing default credentials.