Exploitation of several TOTOLINK and DrayTek command injection flaws has enabled the Rust-based RustoBot to remotely execute arbitrary system commands, including those that allow self-propagation to devices of varying architectures, a report from Fortinet showed. After evading detection by concealing its configuration with XOR encryption algorithm, RustoBot proceeds with command-and-control server domain resolution and DDoS attack execution via the Raw IP, TCP, and UDP protocols, said Fortinet researchers, who noted the intrusions to be conducted using a structured command system. Organizations have been urged to mitigate the threat of RustoBot by not only bolstering endpoint monitoring and authentication systems but also strengthening cybersecurity training programs for their employees.
Network Security, Threat Intelligence
Novel RustoBot botnet leverages router exploits to target tech sector

(Adobe Stock)
Technology industry organizations in Mexico, Japan, Taiwan, and Vietnam have been targeted with attacks involving the newly emergent RustoBot botnet, which leverages TOTOLINK and DrayTek router vulnerabilities to facilitate distributed denial-of-service intrusions, over the first two months of 2025, according to GBHackers News.
Exploitation of several TOTOLINK and DrayTek command injection flaws has enabled the Rust-based RustoBot to remotely execute arbitrary system commands, including those that allow self-propagation to devices of varying architectures, a report from Fortinet showed. After evading detection by concealing its configuration with XOR encryption algorithm, RustoBot proceeds with command-and-control server domain resolution and DDoS attack execution via the Raw IP, TCP, and UDP protocols, said Fortinet researchers, who noted the intrusions to be conducted using a structured command system. Organizations have been urged to mitigate the threat of RustoBot by not only bolstering endpoint monitoring and authentication systems but also strengthening cybersecurity training programs for their employees.
Exploitation of several TOTOLINK and DrayTek command injection flaws has enabled the Rust-based RustoBot to remotely execute arbitrary system commands, including those that allow self-propagation to devices of varying architectures, a report from Fortinet showed. After evading detection by concealing its configuration with XOR encryption algorithm, RustoBot proceeds with command-and-control server domain resolution and DDoS attack execution via the Raw IP, TCP, and UDP protocols, said Fortinet researchers, who noted the intrusions to be conducted using a structured command system. Organizations have been urged to mitigate the threat of RustoBot by not only bolstering endpoint monitoring and authentication systems but also strengthening cybersecurity training programs for their employees.
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds