Security researchers have uncovered a new Mirai-based botnet, ShadowV2, which surfaced during the widespread Amazon Web Services (AWS) outage in October 2025. Although there's no evidence that ShadowV2 caused the outage, its activity coincided exactly with the outage window then stopped when services resumed strongly suggesting the incident served as a test run for future large-scale attacks. ShadowV2 targets vulnerable Internet-of-Things (IoT) devices including routers, NAS appliances, and DVRs made by vendors such as D-Link, TP-Link, and systems running DD-WRT firmware.The malware exploits at least eight known vulnerabilities, including, CVE-2009-2765 (DD-WRT), CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915 (D-Link), CVE-2023-52163 (DigiEver), CVE-2024-3721 (TBK), CVE-2024-53375 (TP-Link). Notably, CVE-2024-10914 is a known, actively exploited command-injection flaw in retired (EoL) D-Link devices and the vendor has confirmed it will not issue a patch. Likewise, for CVE-2024-10915, the vendor confirmed that impacted devices are no longer supported. Infection begins via a downloader script retrieved from a remote server. Once executed, the script delivers the ShadowV2 binary, which identifies itself as ShadowV2 Build v1.0.0 IoT version, borrowing heavily from the codebase of the older Mirai LZRD variant. Configuration data such as file paths, HTTP headers, and user-agent strings is XOR-encoded, a simple obfuscation used to evade detection. Post-infection, compromised devices join a botnet capable of launching distributed denial-of-service (DDoS) attacks over UDP, TCP, and HTTP (with multiple flood types per protocol). The botnet is controlled via a command-and-control (C2) infrastructure that issues attack commands to bots. Immediately decommission or physically replace any EoL or unsupported IoT devices. Ensure all remaining network devices run up-to-date firmware and disable remote administration if not strictly required. Segment IoT devices onto separate VLANs or network zones to isolate them from critical infrastructure. Monitor outbound traffic from IoT segments and look for unusual patterns for example devices connecting to suspicious IPs.
Cybercriminals are intensifying their attacks on the telecommunications and media sector, targeting critical infrastructure with sophisticated methods. Recent security analysis rev...
Bloody Wolf, a long-running threat actor active since at least 2023, has expanded its activity across Central Asia, targeting organizations in Kyrgyzstan and Uzbekistan throughout ...
A widespread supply-chain attack has targeted the npm ecosystem, where several JavaScript packages were found distributing a sophisticated malware strain known as Shai-Hulud. The m...