Hackers Actively Exploiting IoT Vulnerabilities to Deploy New ShadowV2 Malware

During late October 2025, a new malware campaign dubbed ShadowV2 emerged, coinciding with a global AWS disruption.

This sophisticated threat actively exploits vulnerabilities in IoT devices to assemble a botnet for distributed denial-of-service (DDoS) attacks.

The malware’s rapid deployment indicates a coordinated effort to harness compromised hardware for large-scale disruptive activities.

The infection spread swiftly across seven industries, including technology, education, and retail, impacting organizations in the United States, Europe, and Asia.

Experts believe this surge was likely a “test run” designed to evaluate the botnet’s potential for causing widespread service interruptions.

The widespread nature of the campaign highlights the persistent risks associated with unsecured connected devices in enterprise environments.

Fortinet security analysts identified the malware leveraging older, unpatched security flaws in routers and DVRs from vendors like D-Link and TP-Link.

By targeting these known weaknesses, the attackers successfully compromised numerous devices that organizations had failed to update with the latest firmware patches.

The attack chain initiates when a vulnerable device is forced to download a script named binary.sh from a remote server at 81.88.18.108.

Downloader script binary.sh (Source - Fortinet)
Downloader script binary.sh (Source – Fortinet)

As seen in the above figure, this script automatically detects the host’s architecture—whether ARM, MIPS, or x86—and retrieves the corresponding malware payload to ensure successful execution.

Technical Analysis of ShadowV2

ShadowV2 mirrors the architecture of the “LZRD” Mirai variant but employs distinct obfuscation techniques. Upon launch, it utilizes a simple XOR cipher with the key 0x22 to decrypt its configuration.

VendorCVE IDVulnerability Details
DDWRTCVE-2009-2765HTTP Daemon Arbitrary Command Execution
D-LinkCVE-2020-25506ShareCenter CGI Code Execution
D-LinkCVE-2022-37055Buffer Overflow in HNAP Main
D-LinkCVE-2024-10914Account Manager Command Injection
D-LinkCVE-2024-10915Account Manager Command Injection
DigiEverCVE-2023-52163Time Setup CGI Command Injection
TBKCVE-2024-3721DVR Command Injection
TP-LinkCVE-2024-53375Archer Devices Command Injection

This hidden data includes file paths, such as /proc/, and deceptive User-Agent strings intended to mask malicious traffic as legitimate user activity.

XOR-encoded configuration (Source - Fortinet)
XOR-encoded configuration (Source – Fortinet)

Once active, the malware establishes contact with its command-and-control server to receive attack orders.

It supports multiple DDoS vectors, including UDP floods and TCP SYN floods, mapping these behaviors to specific internal function IDs for rapid deployment against targets.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Hackers Actively Exploiting IoT Vulnerabilities to Deploy New ShadowV2 Malware appeared first on Cyber Security News.