IoT Under Siege: RondoDox Botnet Exploits React2Shell Vulnerability in Massive Attack Campaign
Cybersecurity researchers have revealed a nine-month RondoDox botnet campaign targeting IoT devices and web apps. Leveraging the React2Shell flaw, threat actors drop cryptocurrency miners with quirky names like “/nuts/poop”. To dodge this digital chaos, update Next.js, firewall up, and keep an eye on suspicious activities.

Hot Take:
RondoDox is the Swiss Army knife of botnets, slashing its way through IoT devices and web applications like a cyber ninja on a mission. With the newly discovered React2Shell flaw, this botnet is on a global tour, making pit stops in the U.S., Germany, France, and India, just to name a few. If your Next.js servers are still sipping eggnog in the vulnerable zone, it’s time to upgrade to “2026: A Secure Odyssey.” Otherwise, you might find your devices moonlighting as cryptocurrency miners, with a penchant for eliminating competition like a digital gladiator.
Key Points:
- RondoDox botnet campaign targets IoT devices and web apps.
- Exploits React2Shell flaw for remote code execution.
- Approximately 90,300 vulnerable instances as of December 2025.
- Botnet activity includes cryptocurrency mining and eliminating rival malware.
- Mitigation strategies involve updating Next.js and segmenting IoT devices.
