
ShadowV2: New MaaS botnet for DDoS attacks uses containers
Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June 24, 2025, when their honeypots were activated. This system relies on a Trojan horse written in Go that turns compromised Amazon Web Services cloud containers into fully-fledged nodes for DDoS attacks. ShadowV2 is unique in that it exploits vulnerable Docker instances running on AWS EC2 virtual machines . The first step in the infection is the deployment of a helper container based on an Ubuntu image, which automatically installs the necessary tools. Next, a separate container is created with a pre-compiled ELF










