Raleigh, NC

32°F
Scattered Clouds Humidity: 78%
Wind: 2.68 M/S

ShadowV2 Emerges Mirai Botnet, Targets IoT During AWS Outage Test Run.

ShadowV2 Emerges Mirai Botnet, Targets IoT During AWS Outage Test Run.

A new Mirai based botnet, ShadowV2, briefly targeted vulnerable Internet of Things (IoT) devices during the AWS outage in late October. Researchers at FortiGuard Labs observed the malware exploiting IoT vulnerabilities across numerous countries and industries, suggesting the activity was likely a test run for future, larger scale attacks.

Global Targeting During AWS Disruption

ShadowV2 was active only during the late October AWS disruption. It targets IoT devices by exploiting known vulnerabilities in products from various vendors, including DDWRT (CVE 2009 2765), D Link, DigiEver, TBK, and TP Link.

The botnet targeted devices across multiple countries worldwide, spanning Oceania (Australia), the Americas (Canada, US, Brazil), Europe (UK, France, Italy), Africa (Morocco, South Africa), and Asia (China, Japan, Russia). Victims were reported across several industries, including technology, retail, hospitality, government, and telecommunications.

Malware Operation and Capabilities

ShadowV2 spreads through multiple IoT vulnerabilities, dropping a downloader script named binary.sh. The malware resembles the Mirai LZRD variant, using XOR key 0x22 to decode its configuration and load paths, headers, and User Agent strings.

After resolving its Command and Control (C2) domain, ShadowV2 connects to 81[.]88[.]18[.]108 and identifies itself as "ShadowV2 Build v1.0.0 for IoT." It then initializes a wide range of flood methods and waits for C2 commands to launch Distributed Denial of Service (DDoS) attacks.

The malware supports three protocols: UDP, TCP, and HTTP. Implemented attack methods include UDP floods, several TCP based floods (like TCP SYN, TCP ACK STOMP), and HTTP level floods.

Fortinet concluded that the evolution of ShadowV2 suggests a strategic shift in threat actor focus toward IoT environments, underscoring that IoT devices remain a major security weak point. Maintaining timely firmware updates and continuous threat intelligence monitoring is critical for ecosystem resilience.

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

Cybersecurity Insight delivers timely updates on global cybersecurity developments, including recent system breaches, cyber-attacks, advancements in artificial intelligence (AI), and emerging technology innovations. Our goal is to keep viewers well-informed about the latest trends in technology and system security, and how these changes impact our lives and the broader ecosystem

Please fill the required field.