What Happened
Network device malware is rapidly evolving, with two new strains—CondiBot and Monaco—recently discovered targeting routers, IoT devices, and network appliances. These malware variants turn everyday network equipment into tools for large-scale distributed denial-of-service (DDoS) attacks and cryptocurrency mining. CondiBot, based on Mirai, infects Linux-based devices and uses them in DDoS botnets. Monaco scans for weak SSH credentials, breaks in, and deploys Monero crypto-mining software.
- CondiBot co-opts devices for disruptive DDoS attacks.
- Monaco brute-forces access to install mining software.
- Both exploit weak credentials and firmware vulnerabilities.
Why Network Device Malware Matters
This trend marks a shift in cyber threats, with attackers now focusing on network infrastructure instead of just endpoints. Routers and IoT devices often lack robust security controls and go unmonitored by traditional endpoint security tools. This creates blind spots attackers can exploit for months, using your organisation’s resources for criminal activity.
- Network hardware lacks traditional security agents.
- Zero-day vulnerabilities in network devices are increasing.
- Attacks often go undetected until substantial damage is done.
Recent industry reports highlight a surge in network device vulnerabilities and zero-day exploits. Attackers are capitalising on slow patch cycles, targeting devices before updates are applied. This raises the risk of both operational disruption and financial loss.
What To Do About Network Device Malware
Organisations can reduce risk by improving network device security. Key steps include:
- Apply firmware and software updates promptly to all devices.
- Use strong, unique passwords for SSH and admin interfaces.
- Monitor device logs for abnormal activity or resource spikes.
- Segment networks to limit the spread of malware.
- Adopt specialised tools for monitoring and protecting IoT and firmware.
It’s also important to update incident response plans to cover network device threats and educate staff on recognising signs of compromise. Proactive measures can help defend against DDoS and crypto-mining botnets targeting your infrastructure.
Originally reported by Inoreader: Cyber Attacks.







