New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章讲的是一个新发现的恶意软件KadNap,专门攻击ASUS路由器和其他边缘网络设备,将其变成恶意流量的代理。自2025年8月以来,已经有14,000台设备被感染,形成一个点对点网络,并通过定制的Kademlia协议连接到C2服务器。 KadNap使用去中心化的DHT协议来隐藏C2服务器的位置,这使得识别和破坏它们变得困难。研究人员发现,近一半的网络连接到专门针对ASUS设备的C2基础设施。大多数受害者位于美国,占60%。 感染过程是从下载恶意脚本开始,然后安装ELF二进制文件kad。为了逃避检测,KadNap使用修改后的Kademlia协议来定位节点和C2服务器。然而,研究者发现它连接到两个特定节点,这削弱了去中心化的效果。 此外,KadNap与Doppelganger代理服务相关联,该服务利用被感染设备作为住宅代理来分发恶意流量。Lumen公司已经采取措施封锁了相关网络流量,并计划发布IOC列表以帮助其他机构应对。 总结时需要涵盖恶意软件名称、攻击目标、传播方式、去中心化机制、主要受害者分布以及其用途和应对措施。确保在100字以内简洁明了地表达这些要点。 </think> 新发现的恶意软件KadNap针对ASUS路由器和其他边缘网络设备发起攻击,将其转化为恶意流量代理。该软件通过定制的Kademlia协议构建点对点网络,使C2服务器更难被识别和破坏。目前已有14,000台设备被感染,主要分布在美国、台湾、香港和俄罗斯等地。研究人员发现其使用去中心化机制隐藏基础设施,但存在漏洞可被追踪。 2026-3-10 15:2:13 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic.

Since August 2025, KadNap has grown to 14,000 devices that are part of a peer-to-peer network and connect to the command-and-control (C2) infrastructure through a custom version of the Kademlia Distributed Hash Table (DHT) protocol.

This makes identifying and disrupting the C2 servers more difficult because the information is decentralized, and each node manages a subset of the complete data.

According to researchers at Black Lotus Labs, the threat research and operations arm of Lumen Technologies, nearly half of the KadNap network is connected to C2 infrastructure dedicated to ASUS-based bots, and the rest communicate with two separate control servers.

Most infected devices are located in the United States, which accounts for 60% of the total, followed by significant percentages in Taiwan, Hong Kong, and Russia.

Number of victims over time
Number of victims over time
Source: Black Lotus Labs

Kademlia-based communication

A KadNap infection begins with downloading a malicious script (aic.sh) from 212.104.141[.]140, which establishes persistence via a cron job that runs every 55 minutes. The payload is an ELF binary named kad, which installs the KadNap client.

Once active, the malware determines the host’s external IP address and contacts multiple Network Time Protocol (NTP) servers to obtain the current time and system uptime.

Function to create the malicious cron job
Function to create the malicious cron job
Source: Black Lotus Labs

For evasion and resistance to takedowns, KadNap uses a modified Kademlia-based DHT protocol to locate botnet nodes and the C2 infrastructure.

“KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to conceal the IP address of their infrastructure within a peer-to-peer system to evade traditional network monitoring,” the researchers explain.

“Infected devices use the DHT protocol to locate and connect with a command-and-control (C2) server, while defenders cannot easily find and add those C2s to threat lists.”

The researchers discovered that KanNap’s implementation of Kademlia is undermined by a consistent connection to two specific nodes, which occurs before reaching the C2 servers. This reduces the decentralization that the protocol could achieve in ideal cases and allows identifying the control infrastructure.

Using custom Kedamlia implementation to find peers
Using custom Kademlia implementation to find peers
Source: Black Lotus Labs

Monetizing KadNap

Black Lotus Labs researchers say that the KadNap botnet is linked to the Doppelganger proxy service, believed to be a rebrand of the Faceless service, previously associated with the TheMoon malware botnet, which also targeted ASUS routers.

Doppelganger sells access to infected devices as residential proxies that can be used to funnel malicious traffic, create pseudonymization layers, and evade blocklists.

Doppelganger homepage
Doppelganger homepage
Source: Black Lotus Labs

As these services are typically used to launch distributed denial-of-service (DDoS), credential stuffing, and brute-force attacks, all leading initially to KadNap victims.

Lumen has taken proactive measures against the KadNap botnet. The company says that at the time of publishing this article, it "blocked all network traffic to or from the
control infrastructure."

The disruption is only on Lumen's network, and a list of indicators of compromise will be released to help others disrupt the botnet on their end.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/new-kadnap-botnet-hijacks-asus-routers-to-fuel-cybercrime-proxy-network/
如有侵权请联系:admin#unsafe.sh