Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
    Cybersecurity

    Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic

    adminBy adminApril 16, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 16, 2026Botnet / Cryptomining

    Cybersecurity researchers have warned of an active malicious campaign that’s targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025.

    “PowMix employs randomized command-and-control (C2) beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections,” Cisco Talos researcher Chetan Raghuprasad said in a report published today.

    “PowMix embeds the encrypted heartbeat data along with unique identifiers of the victim machine into the C2 URL paths, mimicking legitimate REST API URLs. PowMix has the capability to remotely update the new C2 domain to the botnet configuration file dynamically.”

    The attack chain begins with a malicious ZIP file, likely delivered via a phishing email, to activate a multi-stage infection chain that drops PowMix. Specifically, it involves a Windows Shortcut (LNK) that’s used to launch a PowerShell loader, which then extracts the malware embedded within the archive, decrypts it, and runs it in memory.

    The never-before-seen botnet is designed to facilitate remote access, reconnaissance, and remote code execution, while establishing persistence by means of a scheduled task. At the same time, it verifies the process tree to ensure that another instance of the same malware is not running on the compromised host.

    PowMix’s remote management logic allows it to process two different kinds of commands sent from the C2 server. Any non #-prefixed response causes PowMix to shift to arbitrary execution mode, and decrypt and run the obtained payload. 

    • #KILL, to initiate a self-deletion routine and wipe traces of all malicious artifacts
    • #HOST, to enable C2 migration to a new server URL.

    In parallel, it also opens a decoy document with compliance-themed lures as a distraction mechanism. The lure documents reference legitimate brands like Edeka and include compensation data and valid legislative references, potentially in an effort to enhance their credibility and trick recipients, like job aspirants.

    Talos said the campaign shares some level of tactical overlap with a campaign dubbed ZipLine that was disclosed by Check Point in late August 2025 as targeting supply chain-critical manufacturing companies with an in-memory malware called MixShell.

    This includes the use of the same ZIP-based payload delivery, scheduled task persistence, and the abuse of Heroku for C2. That said, no final payloads have been observed beyond the botnet malware itself, leaving questions about its exact motives unanswered.

    “PowMix avoids persistent connections to the C2 server,” Talos said. “Instead, it implements a jitter via the Get-Random PowerShell command to vary the beaconing intervals initially between 0 and 261 seconds, and subsequently between 1,075 and 1,450 seconds. This technique attempts to prevent detection of C2 traffic through predictable network signatures.”

    The disclosure comes as Bitsight sheds light on the infection chain associated with the RondoDox botnet, highlighting the malware’s evolving capabilities to illicitly mine cryptocurrency on infected systems using XMRig on top of the existing distributed denial-of-service (DDoS) attack functionality.

    The findings paint the picture of an actively maintained malware that offers improved evasion, better resilience, aggressive competition removal, and an expanded feature set.

    RondoDox is capable of exploiting over 170 known vulnerabilities in various internet-facing applications to obtain initial access and drop a shell script that performs basic anti-analysis and removes competing malware before dropping the appropriate botnet binary for the architecture.

    The malware “does multiple checks and implements techniques to hinder analysis, which include the usage of nanomites, renaming/removing files, killing processes, and actively checking for debuggers during execution,” Bitsight Principal Research Scientist João Godinho said.

    “The bot is able to run DoS attacks at the internet, transport and application layer, depending on the command and arguments issued by the C2.”

    Botnet Czech discovered Hits newly PowMix Randomized Traffic workers
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow Push Notifications Can Betray Your Privacy (and What to Do About It)
    Next Article EFF pushes back on Google data scandal response: ‘Google screwed up’
    admin
    • Website

    Related Posts

    Two-Factor Authentication Breaks Free from the Desktop

    April 16, 2026

    CIOs fret over rising security concerns amid AI adoption

    April 16, 2026

    Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Chrome just flipped the switch on its new enhanced AI Mode, and it’s a huge upgrade

    April 16, 2026

    Two-Factor Authentication Breaks Free from the Desktop

    April 16, 2026

    Microsoft makes it easier to import Google PMax campaigns

    April 16, 2026

    EFF pushes back on Google data scandal response: ‘Google screwed up’

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,350)
    • Privacy & Online Earning (169)
    • SEO & Digital Marketing (829)
    • Tech Tools & Mobile / Apps (1,615)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Chrome just flipped the switch on its new enhanced AI Mode, and it’s a huge upgrade

    April 16, 2026

    Two-Factor Authentication Breaks Free from the Desktop

    April 16, 2026

    Microsoft makes it easier to import Google PMax campaigns

    April 16, 2026
    Most Popular
    • Chrome just flipped the switch on its new enhanced AI Mode, and it’s a huge upgrade
    • Two-Factor Authentication Breaks Free from the Desktop
    • Microsoft makes it easier to import Google PMax campaigns
    • EFF pushes back on Google data scandal response: ‘Google screwed up’
    • Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic
    • How Push Notifications Can Betray Your Privacy (and What to Do About It)
    • Try Using the 3-3-3 Rule to Stick to an Exercise Routine
    • CIOs fret over rising security concerns amid AI adoption
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.