How Network Device Malware Turns Routers Into DDoS and Crypto-Mining Bots

What Happened

Network device malware is rapidly evolving, with two new strains—CondiBot and Monaco—recently discovered targeting routers, IoT devices, and network appliances. These malware variants turn everyday network equipment into tools for large-scale distributed denial-of-service (DDoS) attacks and cryptocurrency mining. CondiBot, based on Mirai, infects Linux-based devices and uses them in DDoS botnets. Monaco scans for weak SSH credentials, breaks in, and deploys Monero crypto-mining software.

  • CondiBot co-opts devices for disruptive DDoS attacks.
  • Monaco brute-forces access to install mining software.
  • Both exploit weak credentials and firmware vulnerabilities.

Why Network Device Malware Matters

This trend marks a shift in cyber threats, with attackers now focusing on network infrastructure instead of just endpoints. Routers and IoT devices often lack robust security controls and go unmonitored by traditional endpoint security tools. This creates blind spots attackers can exploit for months, using your organisation’s resources for criminal activity.

  • Network hardware lacks traditional security agents.
  • Zero-day vulnerabilities in network devices are increasing.
  • Attacks often go undetected until substantial damage is done.

Recent industry reports highlight a surge in network device vulnerabilities and zero-day exploits. Attackers are capitalising on slow patch cycles, targeting devices before updates are applied. This raises the risk of both operational disruption and financial loss.

What To Do About Network Device Malware

Organisations can reduce risk by improving network device security. Key steps include:

  • Apply firmware and software updates promptly to all devices.
  • Use strong, unique passwords for SSH and admin interfaces.
  • Monitor device logs for abnormal activity or resource spikes.
  • Segment networks to limit the spread of malware.
  • Adopt specialised tools for monitoring and protecting IoT and firmware.

It’s also important to update incident response plans to cover network device threats and educate staff on recognising signs of compromise. Proactive measures can help defend against DDoS and crypto-mining botnets targeting your infrastructure.

Originally reported by Inoreader: Cyber Attacks.

Share this bulletin
Back to Bulletins
Category
Malware
Published
Mar 20 - 2026
Post Tags
Cypro firewall showing robust network security
Secure your business.
Elevate your security, accelerate your growth. We take care of cyber security for high-growth companies, at every stage of their journey.
Get in touch
CyPro Cookie Consent

Hmmm cookies...

Our delicious cookies make your experience smooth and secure.

Privacy PolicyOkay, got it!

We use cookies to enhance your experience, analyse site traffic, and for marketing purposes. For more information on how we handle your personal data, please see our Privacy Policy.

Schedule a Call