{"id":45493,"date":"2026-04-17T04:58:27","date_gmt":"2026-04-16T20:58:27","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic\/"},"modified":"2026-04-17T04:58:27","modified_gmt":"2026-04-16T20:58:27","slug":"newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic\/","title":{"rendered":"Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1\/s1600\/powmix.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjaSAtFbXFX7aYFcwPPrHEMwEZ4VJp2mJQuYo3B3Q2Zrot1co_ilMUWffYOUUFHFRO6zwHHjlMCMOJcbnc_iF69KLU_1LpMhcfFk5YV8A4cdIchhqR1NQGEvyzpHGidnbvqwq2Tg_Y77VwMCpeSSluD8sPRcusqiraqLMCvUCA-QvUv5nCuh2Ns1U2jxNR1\/s1600\/powmix.jpg\" alt=\"Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic\"\/><\/a><\/div>\n<p>Cybersecurity researchers have warned of an active malicious campaign that&#8217;s targeting the workforce in the Czech Republic with a previously undocumented botnet&nbsp;dubbed <strong>PowMix<\/strong> since at least December&nbsp;2025.<\/p>\n<p>&#8220;PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,&#8221; Cisco Talos researcher Chetan Raghuprasad <a href=\"https:\/\/blog.talosintelligence.com\/powmix-botnet-targets-czech-workforce\/\">said<\/a> in a report published&nbsp;today.<\/p>\n<p>&#8220;PowMix embeds the encrypted heartbeat data along with unique identifiers of the victim machine into the C2 URL paths, mimicking legitimate REST API URLs.&nbsp;PowMix has the capability&nbsp;to remotely update the new C2 domain to the botnet configuration file dynamically.&#8221;<\/p>\n<p>The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, to activate a multi-stage infection chain that drops PowMix. Specifically, it involves a Windows Shortcut (LNK) that&#8217;s used to launch a PowerShell loader, which then extracts the malware embedded within the archive, decrypts it, and runs it in&nbsp;memory.<\/p>\n<p>The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution, while establishing persistence by means of a scheduled task. At&nbsp;the same time, it verifies the process tree to ensure that another instance of the same malware is not running on the compromised&nbsp;host.<\/p>\n<p>PowMix&#8217;s remote management logic allows it to process two different kinds of commands sent from the C2 server. Any&nbsp;non #-prefixed response causes PowMix to shift to arbitrary execution mode, and decrypt and run the obtained&nbsp;payload.&nbsp;<\/p>\n<ul>\n<li>#KILL, to initiate a self-deletion routine and wipe traces of all malicious artifacts<\/li>\n<li>#HOST, to enable C2 migration to a new server URL.<\/li>\n<\/ul>\n<p>In parallel, it also opens a decoy document with compliance-themed lures as a distraction mechanism. The&nbsp;lure documents reference legitimate brands like Edeka and include compensation data and valid legislative references, potentially in an effort to enhance their credibility and trick recipients, like job aspirants.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX\/s1600\/attack.jpg\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"555\" data-original-width=\"1000\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVQYe_vwKTjwRa-O_OP8rzoeOfttlDK0u2tZNjcQHrXWzFN1ezT7g6x1mOr-bqRKS3sQUqZ5dsAe4VNs_lTWVyArHHnrbYCTJ39hZ-5qOeiV1FBA144k42DS3KR2vjrk1q-rRHDxfaZy7stU0q4wxPz9nXcc7tvT3xVceAotxsjMEQqK1_CPC9_VIVFtPX\/s1600\/attack.jpg\" alt=\"Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic\" \/><\/a><\/div>\n<p>Talos said the campaign shares some level of tactical overlap with a campaign&nbsp;dubbed <a href=\"https:\/\/thehackernews.com\/2025\/08\/mixshell-malware-delivered-via-contact.html\">ZipLine<\/a> that was disclosed by Check Point in late August 2025 as targeting supply chain-critical manufacturing companies with an in-memory malware called&nbsp;MixShell.<\/p>\n<p>This includes the use of the same ZIP-based payload delivery, scheduled task persistence, and the abuse of Heroku for C2. That&nbsp;said, no final payloads have been observed beyond the botnet malware itself, leaving questions about its exact motives unanswered.<\/p>\n<p>&#8220;PowMix avoids persistent connections to the C2 server,&#8221; Talos said. &#8220;Instead, it implements a jitter via the Get-Random PowerShell command to vary the beaconing intervals initially between 0 and 261 seconds, and subsequently between 1,075 and 1,450 seconds. This&nbsp;technique attempts to prevent detection of C2 traffic through predictable network signatures.&#8221;<\/p>\n<p>The disclosure comes as Bitsight sheds light on the infection chain associated with&nbsp;the <a href=\"https:\/\/thehackernews.com\/2026\/04\/over-1000-exposed-comfyui-instances.html\">RondoDox<\/a> botnet, highlighting the malware&#8217;s evolving capabilities to illicitly mine cryptocurrency on infected systems using XMRig on top of the existing distributed denial-of-service (DDoS) attack functionality.<\/p>\n<p>The findings paint the picture of an actively maintained malware that offers improved evasion, better resilience, aggressive competition removal, and an expanded feature&nbsp;set.<\/p>\n<p>RondoDox is capable of exploiting over 170 known vulnerabilities in various internet-facing applications to obtain initial access and drop a shell script that performs basic anti-analysis and removes competing malware before dropping the appropriate botnet binary for the architecture.<\/p>\n<p>The malware &#8220;does multiple checks and implements techniques to hinder analysis, which include the usage of nanomites, renaming\/removing files, killing processes, and actively checking for debuggers during execution,&#8221; Bitsight Principal Research Scientist Jo\u00e3o&nbsp;Godinho <a href=\"https:\/\/www.bitsight.com\/blog\/rondodox-botnet-malware-analysis\">said<\/a>.<\/p>\n<p>&#8220;The&nbsp;bot is able&nbsp;to run DoS&nbsp;attacks at the internet,&nbsp;transport and application layer, depending on the command and arguments issued by the&nbsp;C2.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have warned of an active malicious campaign that&#8217;s targeting the workforce in the Czech Republic with a previously undocumented botnet&nbsp;dubbed PowMix since at least December&nbsp;2025.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45493","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45493"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45493\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}