IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

KadNap: Takedown-Resistant Router Botnet Uncovered

Image © Arstechnica
Security researchers reveal a takedown-resistant botnet of about 14,000 devices, mostly Asus routers in the US, used as a proxy network for cybercrime.

Security researchers at Lumen’s Black Lotus Labs revealed KadNap, a takedown-resistant botnet that co-opts routers and other network devices into a distributed proxy network used to route traffic for cybercrime.

KadNap infects devices by exploiting publicly disclosed vulnerabilities that owners have not patched, with experts noting there is no evidence of zero-day exploits in this operation.

The botnet has grown to roughly 14,000 infections per day, up from about 10,000 last August, with compromised devices concentrated in the United States and smaller clusters in Taiwan, Hong Kong, and Russia.

A core feature is its peer-to-peer design based on the Kademlia distributed hash table, which lets any node help locate others while concealing the IP addresses of command-and-control servers. This decentralization makes takedowns and centralized disruption difficult for defenders.

KadNap’s operators appear to seek resilience and anonymity, a pattern seen in hardened peer-to-peer networks used by BitTorrent and IPFS. Researchers are sharing indicators of compromise publicly and urge device owners to apply firmware updates, disable unnecessary remote access, and consider factory resets if infections are suspected.

 

Arstechnica

Related News

Mediacom Finishes Minnesota Fiber Build Ahead of Schedule
Ransomware Goes Quantum-Safe: Kyber Claims PQC
MDU Wi-Fi: Secure In-Room Connectivity
Vero Fiber Completes TEC Acquisition
Ezee Fiber Connects First Santa Fe Customers
Emergency ASP.NET Patch for macOS and Linux

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more