14,000 Asus routers infected by takedown-resistant KadNap malware

Researchers at Black Lotus Labs have identified a botnet infecting around 14,000 routers daily, mostly Asus models in the US, using advanced peer-to-peer technology to evade detection. The malware, known as KadNap, turns these devices into proxies for cybercrime activities. Infected users are advised to factory reset their routers and apply firmware updates to remove the threat.

The KadNap botnet, discovered by Black Lotus Labs in August, has grown to infect an average of 14,000 routers and network devices per day as of March 2026, up from 10,000 infections at the time of initial detection. The majority of compromised devices are Asus routers, primarily located in the US, with smaller clusters in Taiwan, Hong Kong, and Russia. According to Chris Formosa, a researcher at Lumen’s Black Lotus Labs, the malware exploits unpatched vulnerabilities in these devices, without relying on zero-day exploits.

What sets KadNap apart is its use of a peer-to-peer network structure based on Kademlia, a distributed hash table (DHT) system originally popularized in technologies like BitTorrent. This design decentralizes control, concealing command-and-control server IP addresses and making the botnet highly resistant to traditional takedown methods. "The KadNap botnet stands out among others that support anonymous proxies in its use of a peer-to-peer network for decentralized control," Formosa and fellow researcher Steve Rudd wrote. "Their intention is clear: avoid detection and make it difficult for defenders to protect against."

In operation, KadNap functions by having nodes query others using a passphrase to locate control infrastructure, eventually receiving files with command-and-control addresses. The infected devices serve as proxies for Doppelganger, a fee-based service that routes customer traffic through residential internet connections to enable anonymous access to restricted sites.

Black Lotus Labs has developed methods to block traffic to the botnet's control infrastructure and is sharing indicators of compromise, such as specific IP addresses and file hashes, through public feeds. Users suspecting infection can check device logs against these indicators. To disinfect, owners must perform a factory reset—restarting alone is insufficient, as the malware persists via a shell script—and ensure firmware is updated, passwords are strong, and remote access is disabled when unnecessary.

Related Articles

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Image generated by AI

Researchers discover SSHStalker botnet infecting Linux servers

Reported by AI Image generated by AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Reported by AI

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

A new botnet known as GoBruteforcer has emerged, focusing on brute-force attacks against Linux servers. The threat was reported by IT Security News on January 12, 2026. Details highlight the botnet's specific targeting of these systems.

Reported by AI

Automated attacks are targeting Fortinet FortiGate devices, creating unauthorized accounts and stealing firewall data. A recent patch from Fortinet may not be as effective as anticipated. The issue was reported on January 23, 2026.

A dangerous Android malware called Massiv is disguising itself as an IPTV app to infect devices and steal banking information. The threat primarily targets users in Portugal through this deceptive application. Security researchers have highlighted the risks posed by this fake app.

Reported by AI

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline