Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Kimwolf botnet hijacks 1.8 million Android TVs and launches massive DDoS attack
Identity

Kimwolf botnet hijacks 1.8 million Android TVs and launches massive DDoS attack

userBy userDecember 17, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

QiAnXin

“Kimwolf is a botnet compiled using NDK [Native Development Kit]”In addition to typical DDoS attack capabilities, it integrates proxy forwarding, reverse shell, and file management capabilities,” the company said in a report released today.

The hyperscale botnet is estimated to have issued 1.7 billion DDoS attack commands in a three-day period from November 19 to 22, 2025, and around the same time one of its command and control (C2) domains – 14emeliaterracewestroxburyma02132[.]su – #1 on Cloudflare’s list of top 100 domains, even surpassing Google at one point.

Kimwolf’s primary infection target is TV boxes deployed in residential network environments. Affected device models include TV BOX, SuperBOX, HiDPTAndroid, P200, X96Q, XBOX, SmartTV, and MX10. Infections are dispersed around the world, with higher concentrations recorded in Brazil, India, the United States, Argentina, South Africa and the Philippines. However, the exact means by which malware propagates to these devices is currently unknown.

cyber security

XLab said it began investigating the botnet after receiving Kimwolf “version 4” artifacts from a trusted community partner on October 24, 2025. Since then, eight more samples have been discovered in the last month.

“We observed that Kimwolf’s C2 domain was successfully removed by unknown parties on at least three occasions. [in December]has been forced to switch to the use of ENS (Ethereum Name Service) to upgrade its tactics and strengthen its infrastructure, demonstrating its strong evolutionary capabilities,” XLab researchers said.

That’s not all. Earlier this month, XLab successfully took control of one of the C2 domains, allowing us to assess the size of the botnet.

What’s interesting about Kimwolf is that it’s tied to the infamous AISURU botnet, which is behind record-breaking DDoS attacks over the past year. It is suspected that the attackers reused AISURU’s code in its early stages before choosing to develop the Kimwolf botnet to evade detection.

XLab said some of these attacks may not be due to AISURU alone, and that Kim Wolf may be participating in or even leading the effort.

“These two major botnets propagated via the same infection script and co-existed within the same batch of devices from September to November,” the company said. “Actually, they belong to the same hacker group.”

This rating is based on the similarity of APK packages uploaded to the VirusTotal platform, in some cases even using the same code signing certificate (‘John Dinglebert Dinglenut VIII VanSack Smith’). Further conclusive evidence arrived on December 8, 2025 with the discovery of an active downloader server (“93.95.112”).[.]59″) contained scripts that referenced both Kimwolf and AISURU APKs.

The malware itself is very simple. Once launched, it ensures that only one instance of the process is running on the infected device, proceeds to decrypt the embedded C2 domain, uses DNS-over-TLS to obtain the C2 IP address, and connects to it to receive and execute commands.

The latest version of the botnet malware, detected on December 12, 2025, introduces a technique known as EtherHiding that leverages the ENS domain (“pawsatyou”).[.]eth”) to obtain the actual C2 IP from the associated smart contract (0xde569B825877c47fE637913eCE5216C644dE081F) to increase resiliency to infrastructure removal efforts.

cyber security

Specifically, it involves extracting the IPv6 address from the “lol” field of the transaction, taking the last 4 bytes of the address, and performing an XOR operation with the key “0x93141715” to obtain the actual IP address.

In addition to encrypting sensitive data related to its C2 servers and DNS resolvers, Kimwolf uses TLS encryption for network communications to receive DDoS commands. In total, the malware supports 13 DDoS attack techniques via UDP, TCP, and ICMP. According to XLab, the targets are in the United States, China, France, Germany, and Canada.

Further analysis revealed that over 96% of the commands were related to the use of bot nodes to provide proxy services. This indicates that attackers are trying to exploit the bandwidth of compromised devices to maximize their profits. As part of the effort, a Rust-based command client module will be deployed to form a proxy network.

The node also provides the ByteConnect Software Development Kit (SDK), a monetization solution that allows app developers and IoT device owners to monetize their traffic.

“The massive botnet originated with Mirai in 2016 and has primarily focused its infections on IoT devices such as home broadband routers and cameras,” XLab said. “However, in recent years, information has been published about multiple million-level megabotnets such as Badbox, Bigpanzi, Vo1d, and Kimwolf, indicating that some attackers are starting to focus on various smart TVs and TV boxes.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRad Power Bikes files for bankruptcy and is considering selling the business
Next Article SonicWall fixes actively exploited CVE-2025-40602 on SMA 100 appliances
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.