Connect with us

Hi, what are you looking for?

Technology

KadNap Botnet Targets ASUS Routers, Expands Cybercrime Network

A newly identified malware known as KadNap is exploiting vulnerabilities in ASUS routers and other edge networking devices to establish a proxy network for cybercriminal activities. Since its emergence in August 2025, KadNap has compromised approximately 14,000 devices, facilitating a decentralized peer-to-peer network that connects to a command-and-control (C2) infrastructure via a modified version of the Kademlia Distributed Hash Table (DHT) protocol.

The decentralized nature of KadNap complicates efforts to identify and dismantle its control servers. According to researchers at Black Lotus Labs, the threat research division of Lumen Technologies, close to half of the KadNap network is linked to C2 infrastructure specifically targeting ASUS devices. The remainder connects to two distinct control servers. The majority of the infected devices are located in the United States, which constitutes around 60% of the total, followed by notable numbers in Taiwan, Hong Kong, and Russia.

The infection process begins when a vulnerable device downloads a malicious script named aic.sh from the IP address 212.104.141[.]140. This script establishes a persistent connection using a cron job that executes every 55 minutes. The payload, an ELF binary called kad, installs the KadNap client. Once operational, the malware identifies the host’s external IP address and queries multiple Network Time Protocol (NTP) servers to fetch the current time and system uptime.

KadNap enhances its resilience against takedowns through its customized Kademlia-based DHT protocol, designed to obscure the IP addresses of its infrastructure within a peer-to-peer system. As noted by the researchers, “KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to conceal the IP address of their infrastructure within a peer-to-peer system to evade traditional network monitoring.” This approach makes it challenging for cybersecurity experts to pinpoint and neutralize the C2 servers.

Despite this complexity, Black Lotus Labs has discovered that KadNap’s implementation of Kademlia is somewhat flawed. The botnet maintains a consistent connection to two specific nodes before linking to the C2 servers, thereby reducing the level of decentralization that could otherwise enhance its stealth.

The KadNap botnet is believed to be associated with the Doppelganger proxy service, which is thought to be a rebranding of the Faceless service. This service has previously been linked to the TheMoon malware botnet, which also targeted ASUS routers. Doppelganger offers access to infected devices as residential proxies, enabling the facilitation of malicious traffic, creation of pseudonymization layers, and evasion of security blocklists. These proxies are commonly employed in distributed denial-of-service (DDoS) attacks, credential stuffing, and brute-force attacks, all of which ultimately impact KadNap’s victims.

In response to the threat posed by the KadNap botnet, Lumen Technologies has taken proactive steps to mitigate its impact. At the time of this report, the company announced that it had successfully blocked all network traffic to and from the botnet’s control infrastructure. While this disruption is currently limited to Lumen’s network, the company plans to release a list of indicators of compromise to assist other organizations in combating the botnet effectively.

You May Also Like

Entertainment

The 15th annual Friends of the Library of Hawaiʻi Music & Book Sale took place on January 18, 2026, at Ward Centre in Honolulu,...

World

U.S. futures experienced a decline on Monday as markets across Asia showed notable gains. This shift occurred after Federal Reserve Chair Jerome Powell revealed...

World

The U.S. Department of War marked the transition from 2025 to 2026 with significant updates, culminating in the historic capture of Venezuelan leader Nicolás...

Top Stories

UPDATE: Major revelations about the highly anticipated second season of Heated Rivalry have just surfaced, igniting excitement among fans eager to see how the...

Health

A long-term study has uncovered that significant declines in physical fitness and strength commence around age 35 and persist through midlife. The research, conducted...

Sports

Jacob Laverman has transformed his early life on a farm in Ocheyedan, Iowa, into a thriving career in sports medicine, culminating in a prominent...

Sports

Following a gripping match on December 29, 2023, episode of WWE RAW, Nikki Bella took the opportunity to clarify the distinctiveness of her submission...

Top Stories

URGENT UPDATE: A vintage stoplight has been stolen from a home in Guthrie, and the owners are in a race against time to recover...

Health

New dietary guidelines issued by the U.S. Department of Health and Human Services are urging parents to limit added sugars in their children’s diets...

World

American Airlines has announced plans to resume nonstop flights from the United States to Venezuela, marking a significant move as the first U.S. airline...

Education

After a prolonged budget impasse, Pennsylvania’s school districts are set to benefit from a newly adopted state budget of $50.09 billion, which includes substantial...

Top Stories

UPDATE: The highly anticipated Rose Bowl featuring the Alabama Crimson Tide against the Indiana Hoosiers kicks off today at 4:00 PM ET in Pasadena,...

Top Stories

URGENT UPDATE: Supreme Court Justice Antonin Scalia, a pivotal figure in American jurisprudence, was found dead today, February 13, 2016, at a private residence...

Business

The ATAC Credit Rotation ETF (NYSEARCA:JOJO) experienced an impressive decline in short interest, dropping by an astounding 89.5% in January 2024. As of January...

Politics

The Undergraduate Senate (UGS) has unanimously passed several significant bills aimed at reforming funding for student organizations and clarifying the governance of class presidents...

Science

A small research team is revealing the rapid growth of datacenter infrastructure in the United States through innovative mapping techniques. According to a report...

Copyright © All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site.