Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

FortiGate devices are exploited to infiltrate the network and steal service account credentials

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

Legora reaches $5.55 billion valuation as AI legal technology boom continues

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet
Identity

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

userBy userMarch 10, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have discovered a new malware called KadNap that primarily targets Asus routers and forces them to join a botnet that proxies malicious traffic.

According to Lumen’s Black Lotus Labs team, the malware was first detected in August 2025 and has spread to more than 14,000 infected devices, with more than 60% of victims concentrated in the United States. Fewer infections have been detected in Taiwan, Hong Kong, Russia, the United Kingdom, Australia, Brazil, France, Italy and Spain.

“KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to hide the IP addresses of its infrastructure within peer-to-peer systems and evade traditional network monitoring,” the cybersecurity firm said in a report shared with Hacker News.

Compromised nodes in the network leverage the DHT protocol to locate and connect to command and control (C2) servers, making them more resistant to detection and disruption.

Once a device is compromised, it is sold by a proxy service named Doppelgänger (“Doppelgänger”[.]This is believed to be a rebrand of Faceless, another proxy service associated with TheMoon malware. Doppelganger’s website claims to offer resident proxies that offer “100% anonymity” in over 50 countries. The service is said to launch in May or June 2025.

Despite its focus on Asus routers, KadNap operators have been found deploying malware against a variety of edge networking devices.

At the heart of the attack is a shell script (‘aic.sh’) downloaded from a C2 server (‘212.104.141’).[.]This file is responsible for starting the process of recruiting the victim into the P2P network. This file creates a cron job that retrieves a shell script from the server every hour at 55 minutes, renames it “.asusrouter” and runs it.

Once persistence is established, the script retrieves the malicious ELF file, renames it to “kad” and executes it. This in turn leads to the rollout of KadNap. This malware can target devices running both ARM and MIPS processors.

KadNap is designed to connect to a Network Time Protocol (NTP) server to obtain the current time and store it along with host uptime. This information serves as the basis for creating hashes that are used to find other peers in the distributed network to receive commands or download additional files.

The files – fwr.sh and /tmp/.sose – contain functionality that closes port 22, the standard TCP port for Secure Shell (SSH) on infected devices, and extracts a list of C2 IP address and port combinations to connect to.

“In short, the innovative use of the DHT protocol allows malware to hide behind the noise of legitimate peer-to-peer traffic and establish a robust communication channel that is difficult to disrupt,” Lumen said.

Further analysis reveals that not all compromised devices are communicating with all C2 servers, indicating that the infrastructure is categorized based on device type and model.

The Black Lotus Labs team told The Hacker News that the Doppelgänger bot is being exploited by wild threat actors. “One problem is that these Asus (and other devices) can also be infected with other malware at the same time, making it difficult to say exactly who is responsible for specific malicious activity,” the company said.

We recommend that users running SOHO routers keep their devices up to date, reboot regularly, change default passwords, secure management interfaces, and replace end-of-life and end-of-life models.

“The KadNap botnet stands out among botnets that support anonymous proxies in their use of peer-to-peer networks for decentralized control,” Lumen concluded. “Their intent is clear: to avoid detection and make it difficult for defenders to defend.”

New Linux threat ClipXDaemon emerges

The disclosure comes as Cyble details a new Linux threat called ClipXDaemon that is designed to target cryptocurrency users by intercepting and changing the addresses of copied wallets. The Clipper malware is distributed via a Linux post-exploitation framework called ShadowHS and is described as an autonomous cryptocurrency clipboard hijacker that targets Linux X11 environments.

The malware is staged entirely in memory and employs stealth techniques such as process masquerading and Wayland session avoidance, while monitoring the clipboard every 200 milliseconds and replacing cryptocurrency addresses with attacker-controlled wallets. You can target Bitcoin, Ethereum, Litecoin, Monero, Tron, Dogecoin, Ripple, and TON wallets.

The decision to avoid running in a Wayland session is intentional, and the display server protocol’s security architecture puts additional controls in place, such as requiring explicit user interaction before an application can access clipboard content. By disabling the malware itself in such scenarios, it aims to eliminate noise and avoid runtime errors.

“ClipXDaemon is fundamentally different from traditional Linux malware. ClipXDaemon contains no command-and-control (C2) logic, executes no beacons, and does not require remote tasks,” the company said. “Instead, it monetizes victims directly by hijacking copied cryptocurrency wallet addresses in X11 sessions and replacing them with attacker-controlled addresses in real time.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLegora reaches $5.55 billion valuation as AI legal technology boom continues
Next Article FortiGate devices are exploited to infiltrate the network and steal service account credentials
user
  • Website

Related Posts

FortiGate devices are exploited to infiltrate the network and steal service account credentials

March 10, 2026

New ‘LeakyLooker’ flaw in Google Looker Studio could allow cross-tenant SQL queries

March 10, 2026

Webinar guide to audit modern agent workflows

March 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

FortiGate devices are exploited to infiltrate the network and steal service account credentials

KadNap malware infects over 14,000 edge devices, powering stealth proxy botnet

Legora reaches $5.55 billion valuation as AI legal technology boom continues

Meta acquired Moltbook, a social network of AI agents that went viral with fake posts.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.