By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New ShadowV2 botnet malware used AWS outage as a test opportunity
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New ShadowV2 botnet malware used AWS outage as a test opportunity
Tech News

New ShadowV2 botnet malware used AWS outage as a test opportunity

By admin 4 Min Read
Share
SHARE

A new Mirai-based botnet malware named ‘ShadowV2’ has been observed targeting IoT devices from D-Link, TP-Link, and other vendors with exploits for known vulnerabilities.

Fortinet’s FortiGuard Labs researchers spotted the activity during the major AWS outage in October. Although the two incidents are not connected, the botnet was active only for the duration of the outage, which may indicate that it was a test run.

ShadowV2 spread by leveraging at least eight vulnerabilities in multiple IoT products:

Wiz
  • DD-WRT (CVE-2009-2765)
  • D-Link (CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915)
  • DigiEver (CVE-2023-52163)
  • TBK (CVE-2024-3721)
  • TP-Link (CVE-2024-53375)

Among these flaws, CVE-2024-10914 is a known-to-be-exploited command injection flaw impacting EoL D-Link devices, which the vendor announced that it would not fix.

Regarding CVE-2024-10915, for which there’s a NetSecFish report from November 2024, BleepingComputer initially did not find the vendor’s advisory for the flaw. After reaching out to the company, we received confirmation that the issue would not be fixed for the impacted models.

D-Link updated an older bulletin to add the particular CVE-ID and published a new one referring to the ShadowV2 campaign, to warn users that end-of-life or end-of-support devices are no longer under development and will not receive firmware updates.

CVE-2024-53375, which was also presented in detail in November 2024, was reportedly fixed via a beta firmware update.

Various exploits used by ShadowV2
<strong>Various exploits used by ShadowV2</strong><br /><em>Source: Fortinet</em>

According to FortiGuard Labs researchers, the ShadowV2 attacks originated from 198[.]199[.]72[.]27, and targeted routers, NAS devices, and DVRs across seven sectors, including government, technology, manufacturing, managed security service providers (MSSPs), telecommunications, and education.

The impact was global, with attacks observed in North and South America, Europe, Africa, Asia, and Australia.

The botnet's global impact
<strong>The botnet&#8217;s global impact</strong><br /><em>Source: Fortinet</em>

The malware identifies itself as “ShadowV2 Build v1.0.0 IoT version,” and is similar to the Mirai LZRD variant, the researchers say in a report that provides technical details on how ShadowV2 functions.

It is delivered to vulnerable devices through an initial access stage using a downloader script (binary.sh) that fetches it from a server at 81[.]88[.]18[.]108.

Downloader script
<strong>Downloader script</strong><br /><em>Source: Fortinet</em>

It uses XOR-encoded configuration for filesystem paths, User-Agent strings, HTTP headers, and Mirai-style strings.

In terms of functional capabilities, it supports distributed denial-of-service (DDoS) attacks on UDP, TCP, and HTTP protocols, with various flood types for each. The command-and-control (C2) infrastructure triggers these attacks via commands sent to the bots.

DDoS attack trigger
<strong>DDoS attack trigger</strong><br /><em>Source: Fortinet</em>

Typically, DDoS botnets make money by renting their firepower to cybercriminals or by directly extorting targets, demanding payments for stopping the attacks. However, it is not yet known who is behind Shadow V2 and what their monetization strategy is.

Fortinet shared indicators of compromise (IoCs) to help identify this emerging threat at the bottom of the report, while warning about the importance of keeping firmware updated on IoT devices.

Wiz

Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.

You Might Also Like

Apple and Samsung needed these Honor Magic V5 Ultra-slim Phone Secrets

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Palm-Sized 6-Axis Robotic Arm for Microelectronics and Labs

TruthScan vs. Grammarly: Which AI Detector Works Best?

Ergo named Microsoft Ireland Azure Partner of the Year

TAGGED: botnet, IoT, Malware, mirai, N-day, Shadow V2, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Robert Irwin Net Worth 2025: How Much Money Steve Irwin’s Son Has
Next Article 14 Early Black Friday Deals at Best Buy (2025)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Google’s plan to put data centers in the sky faces thousands of (little) problems: space junk
Business
Pixel 10 Drops to Record Low Only 3 Months After Launch, Now Cheaper Than Mid-Range Android Phones
Gaming News
Strategy Eyes Bitcoin Lending Partnerships With Big Banks
Crypto
Could UK shares protect you in a stock market crash?
Business
Valerien Ismael holds up list of all refereeing mistakes against Blackburn this season
Sports
IREN stock rebounds following $3.6B debt and equity fundraising move
Crypto
Apple and Samsung needed these Honor Magic V5 Ultra-slim Phone Secrets
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Google’s plan to put data centers in the sky faces thousands of (little) problems: space junk

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Google’s plan to put data centers in the sky faces thousands of (little) problems: space junk
December 4, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?