IoT Under Siege: RondoDox Botnet Exploits React2Shell Vulnerability in Massive Attack Campaign

Cybersecurity researchers have revealed a nine-month RondoDox botnet campaign targeting IoT devices and web apps. Leveraging the React2Shell flaw, threat actors drop cryptocurrency miners with quirky names like “/nuts/poop”. To dodge this digital chaos, update Next.js, firewall up, and keep an eye on suspicious activities.

Pro Dashboard

Hot Take:

RondoDox is the Swiss Army knife of botnets, slashing its way through IoT devices and web applications like a cyber ninja on a mission. With the newly discovered React2Shell flaw, this botnet is on a global tour, making pit stops in the U.S., Germany, France, and India, just to name a few. If your Next.js servers are still sipping eggnog in the vulnerable zone, it’s time to upgrade to “2026: A Secure Odyssey.” Otherwise, you might find your devices moonlighting as cryptocurrency miners, with a penchant for eliminating competition like a digital gladiator.

Key Points:

  • RondoDox botnet campaign targets IoT devices and web apps.
  • Exploits React2Shell flaw for remote code execution.
  • Approximately 90,300 vulnerable instances as of December 2025.
  • Botnet activity includes cryptocurrency mining and eliminating rival malware.
  • Mitigation strategies involve updating Next.js and segmenting IoT devices.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?