FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

🚨 FIRST PUBLIC EVIDENCE: RedTail Cryptominer Targets Docker APIs

So my honeypot just caught something interesting: RedTail malware hitting exposed Docker APIs on port 2375/tcp.

For context, RedTail is typically known for exploiting PHP vulnerabilities, PAN-OS, and Ivanti, but not a single vendor mentions Docker in their threat reports.

I did a pretty extensive research dive across:

  • Threat intel reports (Akamai, Forescout, Trend Micro, Kaspersky)
  • SANS ISC, VirusTotal, Malpedia
  • GitHub repos and academic papers
  • Various community discussions

What I confirmed:

  • C2 IP: 178[.]16[.]55[.]224 (AS214943)
  • User-Agent: "libredtail-http" (consistent with RedTail)
  • Absolutely zero public documentation of RedTail targeting Docker

Two theories:

  1. This is a blind spot in threat intelligence reporting
  2. We're seeing a new tactical evolution of RedTail (as of Nov 2025)

Has anyone else seen similar activity?

submitted by /u/mario_candela
[link] [comments]

New Research: RondoDox v2, a 650% Expansion in Exploits

Through our honeypot (https://github.com/mariocandela/beelzebub), I’ve identified a major evolution of the RondoDox botnet, first reported by FortiGuard Labs in 2024.

The newly discovered RondoDox v2 shows a dramatic leap in sophistication and scale:
πŸ”Ί +650% increase in exploit vectors (75+ CVEs observed)
πŸ”Ί New C&C infrastructure on compromised residential IPs
πŸ”Ί 16 architecture variants
πŸ”Ί Open attacker signature: bang2013@atomicmail[.]io
πŸ”Ί Targets expanded from DVRs and routers to enterprise systems

The full report includes:
- In-depth technical analysis (dropper, ELF binaries, XOR decoding)
- Full IOC list
- YARA and Snort/Suricata detection rules
- Discovery timeline and attribution insights

submitted by /u/mario_candela
[link] [comments]

RondoDox v2: When an IoT Botnet Goes Enterprise-Ready

I've just published my analysis on RondoDox v2, and the numbers speak for themselves: +650% exploit vectors compared to v1 documented by FortiGuard Labs.

Key Findings:
- 15+ exploitation vectors (from 2 CVEs to enterprise-grade attacks)
- C&C on compromised residential IP (multiple AWS EC2)
- 16 architectures supported with XOR obfuscation (key: 0x21)
- Open attribution: [bang2013@atomicmail.io](mailto:bang2013@atomicmail.io)

🚨 What concerns me:
The jump from consumer DVR/routers to enterprise targets demonstrates an aggressive expansion strategy.
We're no longer talking about a "simple" DDoS botnet.

🟒 IOCs and detection rules: YARA, Snort/Suricata and complete IOC list available in the full post.

submitted by /u/mario_candela
[link] [comments]
❌