Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

ShadowV2 Botnet Targets Misconfigured AWS

September 30, 2025
Reading Time: 3 mins read
in Alerts
Hackers Target Libraesva Email Flaw

Cybersecurity researchers have uncovered a new botnet service called ShadowV2, which customers can rent to launch distributed denial-of-service (DDoS) attacks. This advanced operation primarily targets misconfigured Docker containers on Amazon Web Services (AWS) cloud servers. Once a system is compromised, a Go-based malware is deployed to transform it into an attack node, joining a larger DDoS botnet. The malware was first detected by Darktrace, who identified it on its honeypots. The operation is orchestrated through a Python-based command-and-control (C2) framework hosted on GitHub Codespaces, showcasing the use of a readily available platform for malicious purposes.

What makes ShadowV2 particularly dangerous is its sophisticated attack methods. The threat actors behind it use a combination of advanced techniques, including HTTP/2 Rapid Reset and a bypass for Cloudflare’s Under Attack Mode (UAM). This demonstrates a high level of technical skill, allowing them to combine targeted exploitation with large-scale DDoS attacks. The campaign uses a Python-based spreader module to breach Docker daemons, particularly those on AWS EC2, while the Go-based Remote Access Trojan (RAT) handles command execution and communication with the operators via the HTTP protocol. The developers have marketed ShadowV2 as an “advanced attack platform,” highlighting its capabilities.

Instead of the typical approach of dropping a custom or existing image from Docker Hub, ShadowV2 uses a unique method to evade detection. It first spawns a generic setup container from an Ubuntu image, installs various tools within it, and then builds and deploys this new image as a live container. This slightly different approach may be an attempt by the attackers to avoid leaving forensic artifacts directly on the victim’s machine. The final container then executes a Go-based ELF binary, which communicates with the C2 server to send heartbeat messages and receive new commands, further solidifying its role in the botnet.

Further analysis of the C2 infrastructure reveals it’s hosted behind Cloudflare to mask its true location. The server, which uses FastAPI and Pydantic, includes a login panel and operator interface, confirming its purpose as a “DDoS-for-Hire” service. The API endpoints allow operators to manage users, configure attack types, specify attack origins, and even exclude certain sites from being targeted. This extensive API and user interface showcase the continued professionalization and “cybercrime-as-a-service” model. The modular, Go-based RAT and structured API highlight the sophisticated development practices of these threat actors.

The emergence of ShadowV2 coincides with other significant cybersecurity developments, including a web scanning botnet targeting vulnerable systems and recent record-breaking DDoS attacks. For instance, Cloudflare recently mitigated two of the largest DDoS attacks ever recorded, peaking at 22.2 terabits per second (Tbps) and 11.5 Tbps, respectively. These attacks were linked to the AISURU botnet, which has infected nearly 300,000 devices, primarily routers and security cameras. The AISURU botnet, managed by a team of three individuals, continues to evolve, adding features like a modified RC4 algorithm for decryption and checks for network utilities to evade detection.

Reference:

  • ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers For DDoS For Hire
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

PolarEdge Expands Router Botnet

PolarEdge Expands Router Botnet

October 22, 2025
PolarEdge Expands Router Botnet

Google Finds New Russian Malware

October 22, 2025
PolarEdge Expands Router Botnet

Copilot Flaw Exposes Sensitive Data

October 22, 2025
WatchGuard Devices At Risk Of RCE

BitLocker May Lock Your Data Silently

October 21, 2025
WatchGuard Devices At Risk Of RCE

North Korea Hackers Use New JS Malware

October 21, 2025
WatchGuard Devices At Risk Of RCE

WatchGuard Devices At Risk Of RCE

October 21, 2025

Latest Alerts

Copilot Flaw Exposes Sensitive Data

PolarEdge Expands Router Botnet

Google Finds New Russian Malware

BitLocker May Lock Your Data Silently

North Korea Hackers Use New JS Malware

WatchGuard Devices At Risk Of RCE

Subscribe to our newsletter

    Latest Incidents

    Union Cyberattack Raises Concerns

    Romanian Prisoner Hacks Prison IT

    Hackers Claim Data On NSA Officials

    Muji Stops Online Sales After Attack

    Major Telco Confirms Cyber Breach

    Russian Hackers Leak UK MoD Files

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial