14,000 Asus routers infected by takedown-resistant KadNap malware

Researchers at Black Lotus Labs have identified a botnet infecting around 14,000 routers daily, mostly Asus models in the US, using advanced peer-to-peer technology to evade detection. The malware, known as KadNap, turns these devices into proxies for cybercrime activities. Infected users are advised to factory reset their routers and apply firmware updates to remove the threat.

The KadNap botnet, discovered by Black Lotus Labs in August, has grown to infect an average of 14,000 routers and network devices per day as of March 2026, up from 10,000 infections at the time of initial detection. The majority of compromised devices are Asus routers, primarily located in the US, with smaller clusters in Taiwan, Hong Kong, and Russia. According to Chris Formosa, a researcher at Lumen’s Black Lotus Labs, the malware exploits unpatched vulnerabilities in these devices, without relying on zero-day exploits.

What sets KadNap apart is its use of a peer-to-peer network structure based on Kademlia, a distributed hash table (DHT) system originally popularized in technologies like BitTorrent. This design decentralizes control, concealing command-and-control server IP addresses and making the botnet highly resistant to traditional takedown methods. "The KadNap botnet stands out among others that support anonymous proxies in its use of a peer-to-peer network for decentralized control," Formosa and fellow researcher Steve Rudd wrote. "Their intention is clear: avoid detection and make it difficult for defenders to protect against."

In operation, KadNap functions by having nodes query others using a passphrase to locate control infrastructure, eventually receiving files with command-and-control addresses. The infected devices serve as proxies for Doppelganger, a fee-based service that routes customer traffic through residential internet connections to enable anonymous access to restricted sites.

Black Lotus Labs has developed methods to block traffic to the botnet's control infrastructure and is sharing indicators of compromise, such as specific IP addresses and file hashes, through public feeds. Users suspecting infection can check device logs against these indicators. To disinfect, owners must perform a factory reset—restarting alone is insufficient, as the malware persists via a shell script—and ensure firmware is updated, passwords are strong, and remote access is disabled when unnecessary.

Makala yanayohusiana

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Picha iliyoundwa na AI

Researchers discover SSHStalker botnet infecting Linux servers

Imeripotiwa na AI Picha iliyoundwa na AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

The FBI, BND and BfV warn of attacks by Russian state hackers on TP-Link routers and WLAN extenders. The Fancy Bear group has infiltrated thousands of devices worldwide to steal sensitive data. In Germany, 30 affected devices have already been detected.

Imeripotiwa na AI

Law enforcement agencies from the United States and Europe, supported by private partners, have taken down the SocksEscort cybercrime proxy network. This service, powered by the AVRecon malware infecting Linux-based devices, provided cybercriminals with access to compromised IP addresses. The operation resulted in the seizure of domains, servers, and cryptocurrency assets.

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

Imeripotiwa na AI

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Jumanne, 31. Mwezi wa tatu 2026, 02:50:43

Router firms respond to FCC foreign Wi-Fi ban amid cyber threats

Jumamosi, 7. Mwezi wa tatu 2026, 19:46:31

IT expert warns of digital scams ahead of Lebaran

Alhamisi, 26. Mwezi wa pili 2026, 18:05:06

New AirSnitch attack bypasses Wi-Fi client isolation

Jumatatu, 23. Mwezi wa pili 2026, 08:01:15

Malicious npm packages harvest crypto keys and secrets

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Jumatano, 11. Mwezi wa pili 2026, 12:13:09

North Korean hackers use AI video to spread malware

Jumatano, 11. Mwezi wa pili 2026, 07:36:13

Top VPNs targeted by typosquatting with malicious fake domains

Jumanne, 10. Mwezi wa pili 2026, 19:39:23

New Linux botnet SSHStalker uses IRC for command-and-control

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa