Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

KadNap: Takedown-Resistant Router Botnet Uncovered

Image © Arstechnica
Security researchers reveal a takedown-resistant botnet of about 14,000 devices, mostly Asus routers in the US, used as a proxy network for cybercrime.

Security researchers at Lumen’s Black Lotus Labs revealed KadNap, a takedown-resistant botnet that co-opts routers and other network devices into a distributed proxy network used to route traffic for cybercrime.

KadNap infects devices by exploiting publicly disclosed vulnerabilities that owners have not patched, with experts noting there is no evidence of zero-day exploits in this operation.

The botnet has grown to roughly 14,000 infections per day, up from about 10,000 last August, with compromised devices concentrated in the United States and smaller clusters in Taiwan, Hong Kong, and Russia.

A core feature is its peer-to-peer design based on the Kademlia distributed hash table, which lets any node help locate others while concealing the IP addresses of command-and-control servers. This decentralization makes takedowns and centralized disruption difficult for defenders.

KadNap’s operators appear to seek resilience and anonymity, a pattern seen in hardened peer-to-peer networks used by BitTorrent and IPFS. Researchers are sharing indicators of compromise publicly and urge device owners to apply firmware updates, disable unnecessary remote access, and consider factory resets if infections are suspected.

 

Arstechnica

Related News

IQ Fiber Expands into Delaware Kent County Launch
All West Fiber expands Rawlins network
Preview: Connected America 2026 Agenda
Pilot Fiber Expands 400G Wavelengths in NYC
FCC Bans Foreign-Made Consumer Routers
Direct Communications Launches Mobile via gaiia in 60 Days

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more