Hackers Actively Exploiting IoT Vulnerabilities to Deploy New ShadowV2 Malware

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

During late October 2025, a new malware campaign dubbed ShadowV2 emerged, coinciding with a global AWS disruption.

This sophisticated threat actively exploits vulnerabilities in IoT devices to assemble a botnet for distributed denial-of-service (DDoS) attacks.

The malware’s rapid deployment indicates a coordinated effort to harness compromised hardware for large-scale disruptive activities.

The infection spread swiftly across seven industries, including technology, education, and retail, impacting organizations in the United States, Europe, and Asia.

Experts believe this surge was likely a “test run” designed to evaluate the botnet’s potential for causing widespread service interruptions.

The widespread nature of the campaign highlights the persistent risks associated with unsecured connected devices in enterprise environments.

Fortinet security analysts identified the malware leveraging older, unpatched security flaws in routers and DVRs from vendors like D-Link and TP-Link.

By targeting these known weaknesses, the attackers successfully compromised numerous devices that organizations had failed to update with the latest firmware patches.

The attack chain initiates when a vulnerable device is forced to download a script named binary.sh from a remote server at 81.88.18.108.

Downloader script binary.sh (Source – Fortinet)

As seen in the above figure, this script automatically detects the host’s architecture—whether ARM, MIPS, or x86—and retrieves the corresponding malware payload to ensure successful execution.

Technical Analysis of ShadowV2

ShadowV2 mirrors the architecture of the “LZRD” Mirai variant but employs distinct obfuscation techniques. Upon launch, it utilizes a simple XOR cipher with the key 0x22 to decrypt its configuration.

Vendor CVE ID Vulnerability Details
DDWRT CVE-2009-2765 HTTP Daemon Arbitrary Command Execution
D-Link CVE-2020-25506 ShareCenter CGI Code Execution
D-Link CVE-2022-37055 Buffer Overflow in HNAP Main
D-Link CVE-2024-10914 Account Manager Command Injection
D-Link CVE-2024-10915 Account Manager Command Injection
DigiEver CVE-2023-52163 Time Setup CGI Command Injection
TBK CVE-2024-3721 DVR Command Injection
TP-Link CVE-2024-53375 Archer Devices Command Injection

This hidden data includes file paths, such as /proc/, and deceptive User-Agent strings intended to mask malicious traffic as legitimate user activity.

XOR-encoded configuration (Source – Fortinet)

Once active, the malware establishes contact with its command-and-control server to receive attack orders.

It supports multiple DDoS vectors, including UDP floods and TCP SYN floods, mapping these behaviors to specific internal function IDs for rapid deployment against targets.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.