{"id":625,"date":"2026-04-16T19:12:35","date_gmt":"2026-04-16T19:12:35","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=625"},"modified":"2026-04-16T19:12:35","modified_gmt":"2026-04-16T19:12:35","slug":"newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=625","title":{"rendered":"Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 16, 2026<\/span><\/span><span class=\"p-tags\">Botnet \/ Cryptomining<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1\/s1700-e365\/powmix.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers have warned of an active malicious campaign that&#8217;s targeting the workforce in the Czech Republic with a previously undocumented botnet\u00a0dubbed <strong>PowMix<\/strong> since at least December\u00a02025.<\/p>\n<p>\u00abPowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,\u00bb Cisco Talos researcher Chetan Raghuprasad <a href=\"https:\/\/blog.talosintelligence.com\/powmix-botnet-targets-czech-workforce\/\">said<\/a> in a report published\u00a0today.<\/p>\n<p>\u00abPowMix embeds the encrypted heartbeat data along with unique identifiers of the victim machine into the C2 URL paths, mimicking legitimate REST API URLs.\u00a0PowMix has the capability\u00a0to remotely update the new C2 domain to the botnet configuration file dynamically.\u00bb<\/p>\n<p>The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, to activate a multi-stage infection chain that drops PowMix. Specifically, it involves a Windows Shortcut (LNK) that&#8217;s used to launch a PowerShell loader, which then extracts the malware embedded within the archive, decrypts it, and runs it in\u00a0memory.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-blindspot-d-2\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu\/s728-e100\/nudge-d-2.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution, while establishing persistence by means of a scheduled task. At\u00a0the same time, it verifies the process tree to ensure that another instance of the same malware is not running on the compromised\u00a0host.<\/p>\n<p>PowMix&#8217;s remote management logic allows it to process two different kinds of commands sent from the C2 server. Any\u00a0non #-prefixed response causes PowMix to shift to arbitrary execution mode, and decrypt and run the obtained\u00a0payload.\u00a0<\/p>\n<ul>\n<li>#KILL, to initiate a self-deletion routine and wipe traces of all malicious artifacts<\/li>\n<li>#HOST, to enable C2 migration to a new server URL.<\/li>\n<\/ul>\n<p>In parallel, it also opens a decoy document with compliance-themed lures as a distraction mechanism. The\u00a0lure documents reference legitimate brands like Edeka and include compensation data and valid legislative references, potentially in an effort to enhance their credibility and trick recipients, like job aspirants.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX\/s1700-e365\/attack.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX\/s1700-e365\/attack.jpg\" alt=\"\" border=\"0\" data-original-height=\"555\" data-original-width=\"1000\"\/><\/a><\/div>\n<p>Talos said the campaign shares some level of tactical overlap with a campaign\u00a0dubbed ZipLine that was disclosed by Check Point in late August 2025 as targeting supply chain-critical manufacturing companies with an in-memory malware called\u00a0MixShell.<\/p>\n<p>This includes the use of the same ZIP-based payload delivery, scheduled task persistence, and the abuse of Heroku for C2. That\u00a0said, no final payloads have been observed beyond the botnet malware itself, leaving questions about its exact motives unanswered.<\/p>\n<p>\u00abPowMix avoids persistent connections to the C2 server,\u00bb Talos said. \u00abInstead, it implements a jitter via the Get-Random PowerShell command to vary the beaconing intervals initially between 0 and 261 seconds, and subsequently between 1,075 and 1,450 seconds. This\u00a0technique attempts to prevent detection of C2 traffic through predictable network signatures.\u00bb<\/p>\n<p>The disclosure comes as Bitsight sheds light on the infection chain associated with\u00a0the RondoDox botnet, highlighting the malware&#8217;s evolving capabilities to illicitly mine cryptocurrency on infected systems using XMRig on top of the existing distributed denial-of-service (DDoS) attack functionality.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The findings paint the picture of an actively maintained malware that offers improved evasion, better resilience, aggressive competition removal, and an expanded feature\u00a0set.<\/p>\n<p>RondoDox is capable of exploiting over 170 known vulnerabilities in various internet-facing applications to obtain initial access and drop a shell script that performs basic anti-analysis and removes competing malware before dropping the appropriate botnet binary for the architecture.<\/p>\n<p>The malware \u00abdoes multiple checks and implements techniques to hinder analysis, which include the usage of nanomites, renaming\/removing files, killing processes, and actively checking for debuggers during execution,\u00bb Bitsight Principal Research Scientist Jo\u00e3o\u00a0Godinho <a href=\"https:\/\/www.bitsight.com\/blog\/rondodox-botnet-malware-analysis\">said<\/a>.<\/p>\n<p>\u00abThe\u00a0bot is able\u00a0to run DoS\u00a0attacks at the internet,\u00a0transport and application layer, depending on the command and arguments issued by the\u00a0C2.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 16, 2026Botnet \/ Cryptomining Cybersecurity researchers have warned of an active malicious campaign that&#8217;s targeting the workforce in the Czech Republic with a previously undocumented botnet\u00a0dubbed PowMix since&hellip;<\/p>\n","protected":false},"author":1,"featured_media":626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[192,1264,1262,825,1261,1263,1266,1267,1265],"class_list":["post-625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-botnet","tag-czech","tag-discovered","tag-hits","tag-newly","tag-powmix","tag-randomized","tag-traffic","tag-workers"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=625"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/625\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/626"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}