Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

KadNap: Takedown-Resistant Router Botnet Uncovered

Image © Arstechnica
Security researchers reveal a takedown-resistant botnet of about 14,000 devices, mostly Asus routers in the US, used as a proxy network for cybercrime.

Security researchers at Lumen’s Black Lotus Labs revealed KadNap, a takedown-resistant botnet that co-opts routers and other network devices into a distributed proxy network used to route traffic for cybercrime.

KadNap infects devices by exploiting publicly disclosed vulnerabilities that owners have not patched, with experts noting there is no evidence of zero-day exploits in this operation.

The botnet has grown to roughly 14,000 infections per day, up from about 10,000 last August, with compromised devices concentrated in the United States and smaller clusters in Taiwan, Hong Kong, and Russia.

A core feature is its peer-to-peer design based on the Kademlia distributed hash table, which lets any node help locate others while concealing the IP addresses of command-and-control servers. This decentralization makes takedowns and centralized disruption difficult for defenders.

KadNap’s operators appear to seek resilience and anonymity, a pattern seen in hardened peer-to-peer networks used by BitTorrent and IPFS. Researchers are sharing indicators of compromise publicly and urge device owners to apply firmware updates, disable unnecessary remote access, and consider factory resets if infections are suspected.

 

Arstechnica

Related News

Weather and Super Bowl Drive Churn Risk
Twin Valley Invests $12.3M in Kansas
Gulf Conflict Could Slow U.S. Data Center Boom
Debra Freitas Named to Inc.'s 2026 Female Founders 500
Ritter-ESA St Jude Fundraiser Team-Up
DojoNetworks Secures SOC2 Type II Recertification

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more