RondoDox Botnet Goes Global: 50+ Vulnerabilities, 30 Vendors, and a Whole Lot of Headaches!
RondoDox botnet takes the “exploit shotgun” approach, targeting over 50 vulnerabilities across 30+ vendors. Internet-exposed devices like routers and DVRs are in the crosshairs. This isn’t just your typical “oops, I left the door open” scenario—it’s a full-on “the door is a revolving one” situation. Get your cybersecurity helmets on!

Hot Take:
RondoDox is back and it’s throwing a cybersecurity fiesta that no one asked for. It’s spraying exploits like confetti across the internet, targeting everything from routers to NVRs, and turning the digital world into its party playground. It’s like the Oprah of malware: “You get hacked! And you get hacked! Everyone gets hacked!” But beware, because this isn’t the kind of party you want to RSVP to.
Key Points:
– RondoDox botnet expands its target list to over 50 vulnerabilities across 30+ vendors.
– Described as an “exploit shotgun” approach, targeting routers, DVRs, CCTV systems, and more.
– First detected exploiting a flaw in TP-Link Archer routers in June 2025.
– Uses a “loader-as-a-service” infrastructure, co-packaging with Mirai/Morte payloads.
– AISURU botnet, linked to RondoDox, is responsible for record-setting DDoS attacks.
