top of page

ShadowV2 Botnet Exploits Misconfigured Docker Containers for DDoS-for-Hire

September 25th, 2025

High

Our Cyber Threat Intelligence Unit has identified a new botnet, ShadowV2, actively exploiting misconfigured Docker daemons on AWS EC2 to build a cloud-native DDoS-for-hire platform. First seen in honeypots on June 24, 2025, ShadowV2 combines a Python-based spreader hosted on GitHub Codespaces with a Go ELF RAT running in containers. Operators interact via a FastAPI-powered control panel and APIs, allowing quick scaling of attacks. ShadowV2 is notable for its use of modern techniques, including using HTTP/2 Rapid Reset floods, bypassing Cloudflare protections with headless browser challenge-solving, and commercializing access through a modular subscription model. This campaign presents a high risk to organizations using Docker in cloud environments, leading to cloud resource abuse, financial costs, service disruptions, and attribution challenges. 

Technical Details

  • Attack Type: Container exploitation → DDoS-for-hire botnet.

  • Severity: High.

  • Delivery Method: Python spreader breaching exposed Docker APIs, spawning Ubuntu containers, deploying Go RAT.

  • Infrastructure:

    • C2 domain: shadow.aurozacloud[.]xyz (fronted by Cloudflare).

    • API endpoints: /api/vps/heartbeat, /api/attack/start.

    • Hosted on GitHub Codespaces; implants use Go fasthttp.

  • Evasion & Techniques:

    • HTTP/2 Rapid Reset & large HTTP floods.

    • ChromeDP used to solve Cloudflare JS challenges and obtain clearance cookies.

    • Cloudflare-protected C2 complicates disruption.

Image by ThisisEngineering

Impact

  • Cloud Resource Hijacking: AWS EC2 Docker hosts are weaponized as attack nodes.

  • DDoS Amplification: HTTP/2 Rapid Reset increases attack volume and effectiveness.

  • Financial Burden: Unexpected compute/egress charges and remediation overhead.

  • Collateral Risk: Shared tenants/services degraded by container attack traffic.

  • Crime-as-a-Service Growth: API-driven model lowers entry barrier for non-technical actors.

  • Attribution Difficulty: Cloudflare fronting and scripted bypass hinder takedown efforts.

Detection Method

  • Network & API Logs: Unauthorized Docker API access from Codespaces IPs, esp. with docker-sdk-python/7.1.0 UA and X-Meta-Source-Client: github/codespaces.

  • Container Behavior: Generic Ubuntu containers with unusual package installs and live image creation.

  • Traffic Analysis: Outbound connections to shadow.aurozacloud[.]xyz, HTTP/2 Rapid Reset flood signatures, clearance-cookie activity from headless browsers.

  • Operator Activity: REST API calls consistent with attack orchestration.

  • Threat Hunting: Apply Darktrace-published YARA rules for ShadowV2 samples.

Indicators of Compromise

 

Type 

Indicator 

File Hash – SHA-256 

2462467c89b4a62619d0b2957b21876dc4871db41b5d5fe230aa7ad107504c99 

File Hash – SHA-256 

1b552d19a3083572bc433714dfbc2b75eb6930a644696dedd600f9bd755042f6 

File Hash – SHA-256 

1f70c78c018175a3e4fa2b3822f1a3bd48a3b923d1fbdeaa5446960ca8133e9c 

Domain 

shadow.aurozacloud[.]xyz 

IP Address 

23.97.62[.]139 

IP Address 

23.97.62[.]136 

API Path 

/api/vps/heartbeat 

API Path 

/api/attack/start 


mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Harden Docker APIs: Disable public exposure, enforce authentication.

  • Runtime Controls: Allow only approved container images; block ad-hoc builds.

  • Egress Restrictions: Apply IP/DNS allow-lists for critical workloads.

  • DDoS Detection Tuning: Deploy rules for HTTP/2 Rapid Reset floods and headless-browser activity.

  • Developer Platform Monitoring: Track abnormal use of GitHub Codespaces as C2.

  • IOC Integration: Add provided hashes, domains, IPs, and API paths into SIEM/EDR for proactive detection.

Conclusion

ShadowV2 showcases the growing weaponization of cloud misconfigurations as commercial DDoS tools. By leveraging container exploitation, advanced HTTP/2 attack methods, and resilient C2 infrastructure protected by Cloudflare, ShadowV2 remains a persistent and evasive threat. We urge organizations to secure Docker APIs promptly, monitor for unusual container activity, and enforce strict egress controls to stop their infrastructure from being hijacked.

bottom of page