Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms
News

ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms

Team-CWDBy Team-CWDSeptember 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new campaign that combines traditional malware with modern DevOps tooling has been observed by cybersecurity analysts.

The ShadowV2 DDoS operation, discovered by Darktrace, uses a command-and-control framework hosted on GitHub CodeSpaces, a Python spreader that performs multi-stage Docker deployments for initial access and a Go-based remote access trojan that registers and polls a RESTful API to receive commands.

Initial Access and Deployment

The initial compromise originates from a Python script running in GitHub CodeSpaces, identifiable by headers such as User-Agent: docker-sdk-python/7.1.0 and X-Meta-Source-Client: github/codespaces, and outbound connections from IP address 23.97.62[.]139.

Attackers target exposed Docker daemons on AWS EC2, spawning a temporary setup container, installing tools in it, imaging that container, then deploying a live instance with malware passed via environment variables. This build-on-victim method may reduce forensic artifacts.

“This research points to a maturing criminal market where specialization beats sprawl,” Jason Soroko, senior fellow at certificate authority, Sectigo, said. “By focusing only on DDoS and selling access to capacity, the operators reduce operational risk, simplify tooling and align incentives with paying customers.”

Malware Behaviour and Attack Methods

Once live, the Go binary phones home using MASTER_ADDR and VPS_NAME, derives a unique VPS_ID, then maintains two loops: it sends a heartbeat every second and polls for commands every five seconds.

Researchers emulated the implant to capture commands that instruct HTTP2 rapid reset and high-thread HTTP floods, for example, a 120-thread attack against a target hosted in Amsterdam. 

The attack client uses Valyala’s fasthttp library and supports flags for random query strings, spoofed forwarding headers, a Cloudflare under-attack-mode bypass using a bundled ChromeDP, and an HTTP2 rapid reset mode that amplifies request throughput.

Read more on Cloudflare bypass techniques: Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach

“The ShadowV2 botnet is another reminder that cybercrime is no longer a side hustle, but an industry,” Shane Barney, CISO at Keeper Security, said. “Threat actors are treating Distributed Denial-of-Service (DDoS) attacks like a business service, complete with APIs, dashboards and user interfaces.”

API, UI and Platform Design

The campaign exposes an OpenAPI spec implemented with FastAPI and Pydantic, a full login panel and an operator UI built with Tailwind.

The API shows multi-tenant features, privilege distinctions and endpoints to launch attacks that require a list of zombie systems. The site presents a fake seizure notice, yet still reveals an “advanced attack platform” at its login. Key features include:

  • Python C2 hosted in CodeSpaces

  • Docker-based spreader with on-host image build

  • Go RAT with RESTful registration and polling

  • DDoS options, including HTTP2 rapid reset and UAM bypass

Darktrace framed this as cybercrime-as-a-service that mirrors legitimate cloud-native apps.

“The presence of a DDoS-as-a-service panel with full user functionality further emphasizes the need for defenders to think of these campaigns not as isolated tools but as evolving platforms,” the cybersecurity firm wrote.

“For defenders, the implications are significant. Effective defense requires deep visibility into containerized environments, continuous monitoring of cloud workloads and behavioral analytics capable of identifying anomalous API usage and container orchestration patterns.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More
Next Article Self-Replicating Worm Hits 180+ npm Packages to Steal Credentials in Latest Supply Chain Attack
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

Children and chatbots: What parents should know

January 23, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.