Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

ShadowV2 Botnet Targets Misconfigured AWS

September 30, 2025
Reading Time: 3 mins read
in Alerts
Hackers Target Libraesva Email Flaw

Cybersecurity researchers have uncovered a new botnet service called ShadowV2, which customers can rent to launch distributed denial-of-service (DDoS) attacks. This advanced operation primarily targets misconfigured Docker containers on Amazon Web Services (AWS) cloud servers. Once a system is compromised, a Go-based malware is deployed to transform it into an attack node, joining a larger DDoS botnet. The malware was first detected by Darktrace, who identified it on its honeypots. The operation is orchestrated through a Python-based command-and-control (C2) framework hosted on GitHub Codespaces, showcasing the use of a readily available platform for malicious purposes.

What makes ShadowV2 particularly dangerous is its sophisticated attack methods. The threat actors behind it use a combination of advanced techniques, including HTTP/2 Rapid Reset and a bypass for Cloudflare’s Under Attack Mode (UAM). This demonstrates a high level of technical skill, allowing them to combine targeted exploitation with large-scale DDoS attacks. The campaign uses a Python-based spreader module to breach Docker daemons, particularly those on AWS EC2, while the Go-based Remote Access Trojan (RAT) handles command execution and communication with the operators via the HTTP protocol. The developers have marketed ShadowV2 as an “advanced attack platform,” highlighting its capabilities.

Instead of the typical approach of dropping a custom or existing image from Docker Hub, ShadowV2 uses a unique method to evade detection. It first spawns a generic setup container from an Ubuntu image, installs various tools within it, and then builds and deploys this new image as a live container. This slightly different approach may be an attempt by the attackers to avoid leaving forensic artifacts directly on the victim’s machine. The final container then executes a Go-based ELF binary, which communicates with the C2 server to send heartbeat messages and receive new commands, further solidifying its role in the botnet.

Further analysis of the C2 infrastructure reveals it’s hosted behind Cloudflare to mask its true location. The server, which uses FastAPI and Pydantic, includes a login panel and operator interface, confirming its purpose as a “DDoS-for-Hire” service. The API endpoints allow operators to manage users, configure attack types, specify attack origins, and even exclude certain sites from being targeted. This extensive API and user interface showcase the continued professionalization and “cybercrime-as-a-service” model. The modular, Go-based RAT and structured API highlight the sophisticated development practices of these threat actors.

The emergence of ShadowV2 coincides with other significant cybersecurity developments, including a web scanning botnet targeting vulnerable systems and recent record-breaking DDoS attacks. For instance, Cloudflare recently mitigated two of the largest DDoS attacks ever recorded, peaking at 22.2 terabits per second (Tbps) and 11.5 Tbps, respectively. These attacks were linked to the AISURU botnet, which has infected nearly 300,000 devices, primarily routers and security cameras. The AISURU botnet, managed by a team of three individuals, continues to evolve, adding features like a modified RC4 algorithm for decryption and checks for network utilities to evade detection.

Reference:

  • ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers For DDoS For Hire
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Fortinet Flaw Used To Create Admins

Interview Campaign Exploits JSON Storage

November 18, 2025
Fortinet Flaw Used To Create Admins

Iran Hackers Launch SpearSpecter Spying

November 18, 2025
Fortinet Flaw Used To Create Admins

Fortinet Flaw Used To Create Admins

November 18, 2025
Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Windows 10 Update Error 800f0922

November 17, 2025
Dragon Breath Deploys Roninloader Ghosts

Dragon Breath Deploys Roninloader Ghosts

November 17, 2025

Latest Alerts

Interview Campaign Exploits JSON Storage

Iran Hackers Launch SpearSpecter Spying

Fortinet Flaw Used To Create Admins

Rondodox Targets XWiki To Grow Botnet

Windows 10 Update Error 800f0922

Dragon Breath Deploys Roninloader Ghosts

Subscribe to our newsletter

    Latest Incidents

    Princeton Reports Donor Data Breach

    Massive Cloud DDoS Hits Microsoft Azure

    Kenyan Gov Sites Back Online After Hack

    Logitech Confirms Major Data Breach

    Hackers Steal Maternity Ward Videos

    Checkoutcom Rejects Hackers After Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial