KadNap Malware Turning Asus Routers Into Botnets
A sophisticated new malware called KadNap has been discovered targeting Asus routers and conscripting them into a botnet for proxying malicious traffic. The malware employs a custom version of the Kademlia Distributed Hash Table protocol to conceal its command-and-control infrastructure within a peer-to-peer system, evading traditional network monitoring. The botnet, which has grown to over 14,000 infected devices, is marketed by a proxy service called Doppelganger, tailored for criminal activity. More than 60% of KadNap's victims are based in the United States. The malware demonstrates versatility by targeting various edge networking devices and employing different C2 servers for different victim types.
AI Analysis
Technical Summary
KadNap is a newly identified malware strain that targets Asus routers and other edge networking devices to conscript them into a large-scale botnet used for proxying malicious traffic. Unlike traditional botnets that rely on centralized command-and-control servers, KadNap employs a custom variant of the Kademlia Distributed Hash Table (DHT) protocol, a peer-to-peer network design that conceals its C2 infrastructure. This decentralized approach complicates detection and takedown efforts because the botnet nodes communicate directly with each other rather than through a single point of failure. The botnet has grown to over 14,000 infected devices, with a majority located in the United States. KadNap is marketed by a proxy service named Doppelganger, which is tailored for criminal use cases such as anonymizing malicious traffic or evading IP-based blocking. The malware demonstrates adaptability by targeting various edge devices and using different C2 servers depending on the victim profile, indicating a modular and flexible architecture. The infection vectors are not explicitly detailed, but the targeting of IoT and networking devices suggests exploitation of weak credentials, unpatched vulnerabilities, or default configurations. Indicators of compromise include multiple IP addresses linked to the botnet’s infrastructure and specific malware file hashes. Although no active exploits have been reported, the malware’s use of advanced evasion techniques and decentralized control mechanisms marks it as a significant threat to network security.
Potential Impact
The KadNap malware poses a considerable threat to organizations and individuals using Asus routers and similar edge networking devices. By conscripting these devices into a botnet, KadNap enables attackers to proxy malicious traffic, potentially facilitating a range of criminal activities such as anonymized cyberattacks, data exfiltration, or evasion of network-based defenses. The use of a peer-to-peer DHT-based C2 infrastructure makes traditional detection and mitigation techniques less effective, increasing the botnet’s resilience and longevity. Organizations may experience degraded network performance, increased bandwidth consumption, and potential reputational damage if their devices are implicated in malicious activities. The botnet’s size and geographic distribution, with a concentration in the United States, suggest a broad attack surface and potential for large-scale abuse. Additionally, the malware’s ability to target multiple device types and use different C2 servers complicates defensive measures and incident response. If left unmitigated, KadNap could be leveraged for large-scale proxying services that facilitate further cybercrime, impacting confidentiality, integrity, and availability of network resources.
Mitigation Recommendations
1. Immediately audit and update firmware on all Asus routers and similar edge devices to the latest manufacturer-recommended versions, ensuring known vulnerabilities are patched. 2. Change default credentials on all network devices to strong, unique passwords to prevent brute-force or credential stuffing attacks. 3. Implement network segmentation to isolate IoT and edge devices from critical internal networks, limiting lateral movement and exposure. 4. Deploy network monitoring tools capable of detecting unusual peer-to-peer traffic patterns consistent with Kademlia DHT communications, focusing on anomalous outbound connections. 5. Block known malicious IP addresses associated with KadNap’s infrastructure at network perimeter firewalls and intrusion prevention systems. 6. Use endpoint detection and response (EDR) solutions on network management systems to detect signs of compromise or unauthorized configuration changes. 7. Educate users and administrators about the risks of IoT device compromise and enforce strict access controls and logging for device management interfaces. 8. Collaborate with ISPs and cybersecurity communities to share threat intelligence and coordinate takedown efforts against the botnet’s infrastructure. 9. Consider deploying DNS filtering to prevent infected devices from resolving C2 domains or IP addresses linked to KadNap. 10. Regularly review network traffic for proxying behavior that could indicate botnet activity and respond promptly to incidents.
Affected Countries
United States, United Kingdom, Belgium, Romania
Indicators of Compromise
- ip: 45.135.180.177
- ip: 212.104.141.140
- ip: 45.135.180.38
- ip: 154.7.253.12
- ip: 212.104.141.88
- ip: 79.141.161.152
- ip: 85.158.111.100
- ip: 89.46.38.74
- ip: 91.193.19.226
- hash: 0b3dbb951de7a216dd5032d783ba7d0a5ecda2bf872643c3a4ddd1667fb38ffe
- hash: ebf9de6b67e94b2bd2b0dcda1941e04fef1a1dad830404813e468ab8744b7ed8
KadNap Malware Turning Asus Routers Into Botnets
Description
A sophisticated new malware called KadNap has been discovered targeting Asus routers and conscripting them into a botnet for proxying malicious traffic. The malware employs a custom version of the Kademlia Distributed Hash Table protocol to conceal its command-and-control infrastructure within a peer-to-peer system, evading traditional network monitoring. The botnet, which has grown to over 14,000 infected devices, is marketed by a proxy service called Doppelganger, tailored for criminal activity. More than 60% of KadNap's victims are based in the United States. The malware demonstrates versatility by targeting various edge networking devices and employing different C2 servers for different victim types.
AI-Powered Analysis
Technical Analysis
KadNap is a newly identified malware strain that targets Asus routers and other edge networking devices to conscript them into a large-scale botnet used for proxying malicious traffic. Unlike traditional botnets that rely on centralized command-and-control servers, KadNap employs a custom variant of the Kademlia Distributed Hash Table (DHT) protocol, a peer-to-peer network design that conceals its C2 infrastructure. This decentralized approach complicates detection and takedown efforts because the botnet nodes communicate directly with each other rather than through a single point of failure. The botnet has grown to over 14,000 infected devices, with a majority located in the United States. KadNap is marketed by a proxy service named Doppelganger, which is tailored for criminal use cases such as anonymizing malicious traffic or evading IP-based blocking. The malware demonstrates adaptability by targeting various edge devices and using different C2 servers depending on the victim profile, indicating a modular and flexible architecture. The infection vectors are not explicitly detailed, but the targeting of IoT and networking devices suggests exploitation of weak credentials, unpatched vulnerabilities, or default configurations. Indicators of compromise include multiple IP addresses linked to the botnet’s infrastructure and specific malware file hashes. Although no active exploits have been reported, the malware’s use of advanced evasion techniques and decentralized control mechanisms marks it as a significant threat to network security.
Potential Impact
The KadNap malware poses a considerable threat to organizations and individuals using Asus routers and similar edge networking devices. By conscripting these devices into a botnet, KadNap enables attackers to proxy malicious traffic, potentially facilitating a range of criminal activities such as anonymized cyberattacks, data exfiltration, or evasion of network-based defenses. The use of a peer-to-peer DHT-based C2 infrastructure makes traditional detection and mitigation techniques less effective, increasing the botnet’s resilience and longevity. Organizations may experience degraded network performance, increased bandwidth consumption, and potential reputational damage if their devices are implicated in malicious activities. The botnet’s size and geographic distribution, with a concentration in the United States, suggest a broad attack surface and potential for large-scale abuse. Additionally, the malware’s ability to target multiple device types and use different C2 servers complicates defensive measures and incident response. If left unmitigated, KadNap could be leveraged for large-scale proxying services that facilitate further cybercrime, impacting confidentiality, integrity, and availability of network resources.
Mitigation Recommendations
1. Immediately audit and update firmware on all Asus routers and similar edge devices to the latest manufacturer-recommended versions, ensuring known vulnerabilities are patched. 2. Change default credentials on all network devices to strong, unique passwords to prevent brute-force or credential stuffing attacks. 3. Implement network segmentation to isolate IoT and edge devices from critical internal networks, limiting lateral movement and exposure. 4. Deploy network monitoring tools capable of detecting unusual peer-to-peer traffic patterns consistent with Kademlia DHT communications, focusing on anomalous outbound connections. 5. Block known malicious IP addresses associated with KadNap’s infrastructure at network perimeter firewalls and intrusion prevention systems. 6. Use endpoint detection and response (EDR) solutions on network management systems to detect signs of compromise or unauthorized configuration changes. 7. Educate users and administrators about the risks of IoT device compromise and enforce strict access controls and logging for device management interfaces. 8. Collaborate with ISPs and cybersecurity communities to share threat intelligence and coordinate takedown efforts against the botnet’s infrastructure. 9. Consider deploying DNS filtering to prevent infected devices from resolving C2 domains or IP addresses linked to KadNap. 10. Regularly review network traffic for proxying behavior that could indicate botnet activity and respond promptly to incidents.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.lumen.com/silence-of-the-hops-the-kadnap-botnet"]
- Adversary
- null
- Pulse Id
- 69b13da0db907023c1bfc480
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip45.135.180.177 | — | |
ip212.104.141.140 | — | |
ip45.135.180.38 | — | |
ip154.7.253.12 | CC=US ASN=AS397423 tier.net technologies llc | |
ip212.104.141.88 | CC=GB ASN=AS206509 kcom group limited | |
ip79.141.161.152 | CC=US ASN=AS202015 hz hosting ltd | |
ip85.158.111.100 | CC=BE ASN=AS8368 destiny n.v | |
ip89.46.38.74 | CC=RO ASN=AS41646 alternative commercial networks | |
ip91.193.19.226 | CC=US ASN=AS202015 hz hosting ltd |
Hash
| Value | Description | Copy |
|---|---|---|
hash0b3dbb951de7a216dd5032d783ba7d0a5ecda2bf872643c3a4ddd1667fb38ffe | — | |
hashebf9de6b67e94b2bd2b0dcda1941e04fef1a1dad830404813e468ab8744b7ed8 | — |
Threat ID: 69b140632f860ef9439004e1
Added to database: 3/11/2026, 10:13:55 AM
Last enriched: 3/11/2026, 10:29:10 AM
Last updated: 3/14/2026, 2:47:15 AM
Views: 293
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.