RondoDox botnet expands to 174 exploits, using residential IP infrastructure at scale


A fast-growing botnet called RondoDox has expanded into a large exploitation operation that now uses 174 different vulnerabilities and leans on residential IP infrastructure to host parts of its malware delivery chain. Bitsight says the botnet peaked at 15,000 exploitation attempts in a single day, a scale that makes it one of the more aggressive exploit-driven botnet campaigns tracked in recent months.

Bitsight first observed RondoDox in May 2025 through heavy honeypot activity. The company says the malware reuses Mirai foundations, but unlike classic Mirai, RondoDox focuses on denial-of-service attacks rather than combining scanning, propagation, and DDoS activity inside one bot binary. Instead, the operators appear to split exploitation and hosting roles across separate infrastructure.

The standout detail is the size of the exploit arsenal. Bitsight says RondoDox implemented 174 different exploits, with 148 tied to known CVEs, 15 linked to public proof-of-concept code without formal CVEs, and 11 without public proof-of-concept code at all. That is an unusually broad set for a Mirai-style threat.

Researchers also found signs that the operators track vulnerability disclosures closely. Bitsight says the botnet adopted some exploits within days of public disclosure, including React2Shell, or CVE-2025-55182, which was added on December 6, 2025, just three days after disclosure. The researchers also said they saw one case where exploitation began before a CVE was officially published.

Number of Events and Moving Average for RondoDox Exploits (Source – Bitsight)

How RondoDox changed over time

Early in its campaign, RondoDox used what Bitsight described as a shotgun approach. The operators fired multiple exploits at the same target in hopes that one would work. According to the research, the number of distinct vulnerabilities used in a single day peaked at 49 on October 19, 2025.

That strategy later shifted. By January 2026, daily use dropped to just two active vulnerabilities, which Bitsight interprets as a move toward more selective and targeted exploitation instead of broad-volume probing.

Example of the Shotgun Approach Used by RondoDox (Source – Bitsight)

Why the residential IP angle matters

One of the most unusual parts of the operation is the infrastructure split. Bitsight tracked 32 IP addresses over the observation period, with 16 used for exploitation and 16 used for hosting. The exploitation IPs mostly mapped to hosting providers that accept cryptocurrency, while many hosting IPs appeared to belong to ordinary residential internet providers in countries including the United States, Canada, Sweden, China, and Tunisia.

Bitsight says this strongly suggests the operators used compromised home or consumer devices as hosting infrastructure. Using the Groma dataset, the researchers found that four of 11 residential hosting IPs exposed potentially vulnerable services, including a UniFi Protect interface, two Control4 smart home systems, and a TCL Android TV web server.

Page Returned When IP Is Blacklisted (Source – Bitsight)

That approach gives the botnet two advantages. It makes the infrastructure look less suspicious than traditional VPS hosting, and it can complicate takedown and attribution efforts because the servers may actually be hijacked consumer devices rather than rented attacker-owned systems. This second point is an inference from Bitsight’s findings about residential ISP usage and exposed consumer services.

Key details at a glance

ItemDetail
BotnetRondoDox
First observedMay 2025
Core baseMirai-derived
Main purposeDoS attacks
Exploit count174
Peak activity15,000 exploitation attempts in one day
Infrastructure tracked32 IPs total
Hosting patternMix of crypto-friendly hosting and likely compromised residential IPs

What security teams should do

  • Patch internet-facing devices quickly, especially embedded devices and remote management interfaces.
  • Disable unused remote access services on home, branch, and edge-connected systems.
  • Watch for repeated exploitation attempts against exposed services, especially newly disclosed flaws.
  • Monitor outbound connections to suspicious hosting nodes and investigate consumer-device infrastructure where it should not exist. This detection advice partly follows from Bitsight’s infrastructure findings.
  • Review the indicators of compromise Bitsight published through its GitHub-linked materials referenced in the report.

FAQ

What is RondoDox?

RondoDox is a Mirai-derived botnet that Bitsight says focuses on denial-of-service attacks and uses a large exploit arsenal to compromise internet-exposed devices.

How many exploits does it use?

Bitsight says it uses 174 different exploits, including 148 tied to known CVEs.

Why are residential IPs important in this case?

Because Bitsight found evidence that some malware hosting infrastructure likely ran on compromised home or consumer-connected devices, which makes the operation harder to spot and disrupt.

Is RondoDox still using the same broad attack style?

Not exactly. Bitsight says the botnet moved from a broad shotgun model to a more focused approach by early 2026.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages