Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AI models are starting to decipher high-level math problems

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

US freight technology company puts its shipping system and customer data on the web

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers null-root over 550 Kimwolf and Aisuru botnet command servers
Identity

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

userBy userJanuary 14, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Lumen Technologies’ Black Lotus Labs team announced that it had been null-routing traffic to more than 550 command and control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025.

AISURU and its Android counterpart Kimwolf have recently emerged as one of the largest botnets, capable of forcing enslaved devices to participate in distributed denial of service (DDoS) attacks and relaying malicious traffic for residential proxy services.

Details about Kimwolf were revealed last month when QiAnXin XLab published a thorough analysis of the malware. The malware turns compromised devices (mostly unauthorized Android TV streaming devices) into residential proxies by distributing a software development kit (SDK) called ByteConnect, either directly or through a sketchy pre-installed app.

The end result was that the botnet expanded to infect over 2 million Android devices using the exposed Android Debug Bridge (ADB) service by tunneling through residential proxy networks, thereby allowing attackers to compromise a wide range of TV boxes.

A subsequent Synthient report revealed that the Kimwolf attackers were attempting to offload proxy bandwidth in exchange for an upfront payment.

Black Lotus Labs announced that it has identified a group of residential SSH connections originating from multiple Canadian IP addresses in September 2025 based on analysis of Aisuru’s backend C2 65.108.5.[.]46, IP address to access 194.46.59 using SSH[.]169, proxy-sdk.14emeliaterracewestroxburyma02132[.]vinegar.

cyber security

Notably, second-level domains surpassed Google on Cloudflare’s list of top 100 domains in November 2025, prompting the web infrastructure company to remove them from the list.

Then, in early October 2025, the cybersecurity company announced that it had identified another C2 domain – greatfirewallisacensingtool.14emeliaterracewestroxburyma02132[.]su – resolved to 104.171.170[.]21, an IP address belonging to Utah-based hosting provider Resi Rack LLC. The company advertises itself as a “premium game server hosting provider.”

This connection is significant because a recent report by independent security journalist Brian Krebs revealed how the people behind various botnet-based proxy services were selling their warez on a Discord server called resi.[.]To. This includes the co-founders of Resi Rack, who are said to have been actively working on selling proxy services through Discord for about two years.

The server, which has since disappeared, was owned by someone named “d” (presumed to be a shortened version of the handle “Dort”), and Snow is believed to be the botmaster.

“In early October, we observed a 300% spike in the number of new bots added to Kimwolf in seven days. This was the beginning of the increase, and by mid-month the total number of bots reached 800,000,” Black Lotus Labs said. “We found that nearly all of the bots in this surge were being sold through a single residential proxy service.”

It was subsequently discovered that the Kimwolf C2 architecture was scanning for vulnerable devices in PYPROXY and other services from October 20, 2025 to November 6, 2025. This behavior is explained by the botnet’s exploitation of security flaws in many proxy services that allow residential proxy endpoints to interact with devices on the internal network and drop malware.

This turns your device into a residential proxy node and makes its public IP address (assigned by your internet service provider) listed for rental on your residential proxy provider site. Threat actors, such as the attackers behind these botnets, lease access to infected nodes and weaponize them to scan local networks for devices with ADB mode enabled to further spread.

cyber security

“After one successful null route, [in October 2025]the greatfirewallisacensingtool domain was observed moving to 104.171.170.[.]201, another Resi Rack LLC IP,” Black Lotus Labs said. “Once this server started, we saw a significant spike in traffic from 176.65.149.”[.]At 19:25565, the server was being used to host malware. This was on a common ASN that was simultaneously used by the Aisuru botnet. ”

The disclosure came against the backdrop of a Chawkr report detailing a sophisticated proxy network containing 832 compromised KeeneticOS routers operating between Russian ISPs including Net By Net Holding LLC, VladLink, and GorodSamara.

“The consistent SSH fingerprint and identical configuration across all 832 devices indicates automated mass exploitation, whether leveraging stolen credentials, embedded backdoors, or known security flaws in router firmware,” the report said. “Each compromised router maintains both HTTP (port 80) and SSH (port 22) access.”

These compromised SOHO routers act as residential proxy nodes, giving threat actors the ability to perform malicious activities under the guise of normal internet traffic. This shows that attackers are increasingly using consumer devices as vectors for multi-stage attacks.

“Unlike data center IPs or known hosting provider addresses, these residential endpoints operate under the radar of most security vendor reputation lists and threat intelligence feeds,” Chawkr said.

“Their legitimate residence classification and clean IP reputation allow malicious traffic to disguise normal consumer activity and evade detection mechanisms that immediately flag requests from suspicious hosting infrastructure or known proxy services.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS freight technology company puts its shipping system and customer data on the web
Next Article AI models are starting to decipher high-level math problems
user
  • Website

Related Posts

AI agents are becoming a privilege escalation path

January 14, 2026

Hackers exploit sideloading of c-ares DLLs to bypass security and deploy malware

January 14, 2026

Fortinet fixes critical FortiSIEM flaw that allows unauthenticated remote code execution

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI models are starting to decipher high-level math problems

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

US freight technology company puts its shipping system and customer data on the web

YouTube now offers a way for parents to block their kids from watching short videos

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.