Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KadNap Malware Turning Asus Routers Into Botnets

0
Medium
Published: Wed Mar 11 2026 (03/11/2026, 10:02:07 UTC)
Source: AlienVault OTX General

Description

A sophisticated new malware called KadNap has been discovered targeting Asus routers and conscripting them into a botnet for proxying malicious traffic. The malware employs a custom version of the Kademlia Distributed Hash Table protocol to conceal its command-and-control infrastructure within a peer-to-peer system, evading traditional network monitoring. The botnet, which has grown to over 14,000 infected devices, is marketed by a proxy service called Doppelganger, tailored for criminal activity. More than 60% of KadNap's victims are based in the United States. The malware demonstrates versatility by targeting various edge networking devices and employing different C2 servers for different victim types.

AI-Powered Analysis

AILast updated: 03/11/2026, 10:29:10 UTC

Technical Analysis

KadNap is a newly identified malware strain that targets Asus routers and other edge networking devices to conscript them into a large-scale botnet used for proxying malicious traffic. Unlike traditional botnets that rely on centralized command-and-control servers, KadNap employs a custom variant of the Kademlia Distributed Hash Table (DHT) protocol, a peer-to-peer network design that conceals its C2 infrastructure. This decentralized approach complicates detection and takedown efforts because the botnet nodes communicate directly with each other rather than through a single point of failure. The botnet has grown to over 14,000 infected devices, with a majority located in the United States. KadNap is marketed by a proxy service named Doppelganger, which is tailored for criminal use cases such as anonymizing malicious traffic or evading IP-based blocking. The malware demonstrates adaptability by targeting various edge devices and using different C2 servers depending on the victim profile, indicating a modular and flexible architecture. The infection vectors are not explicitly detailed, but the targeting of IoT and networking devices suggests exploitation of weak credentials, unpatched vulnerabilities, or default configurations. Indicators of compromise include multiple IP addresses linked to the botnet’s infrastructure and specific malware file hashes. Although no active exploits have been reported, the malware’s use of advanced evasion techniques and decentralized control mechanisms marks it as a significant threat to network security.

Potential Impact

The KadNap malware poses a considerable threat to organizations and individuals using Asus routers and similar edge networking devices. By conscripting these devices into a botnet, KadNap enables attackers to proxy malicious traffic, potentially facilitating a range of criminal activities such as anonymized cyberattacks, data exfiltration, or evasion of network-based defenses. The use of a peer-to-peer DHT-based C2 infrastructure makes traditional detection and mitigation techniques less effective, increasing the botnet’s resilience and longevity. Organizations may experience degraded network performance, increased bandwidth consumption, and potential reputational damage if their devices are implicated in malicious activities. The botnet’s size and geographic distribution, with a concentration in the United States, suggest a broad attack surface and potential for large-scale abuse. Additionally, the malware’s ability to target multiple device types and use different C2 servers complicates defensive measures and incident response. If left unmitigated, KadNap could be leveraged for large-scale proxying services that facilitate further cybercrime, impacting confidentiality, integrity, and availability of network resources.

Mitigation Recommendations

1. Immediately audit and update firmware on all Asus routers and similar edge devices to the latest manufacturer-recommended versions, ensuring known vulnerabilities are patched. 2. Change default credentials on all network devices to strong, unique passwords to prevent brute-force or credential stuffing attacks. 3. Implement network segmentation to isolate IoT and edge devices from critical internal networks, limiting lateral movement and exposure. 4. Deploy network monitoring tools capable of detecting unusual peer-to-peer traffic patterns consistent with Kademlia DHT communications, focusing on anomalous outbound connections. 5. Block known malicious IP addresses associated with KadNap’s infrastructure at network perimeter firewalls and intrusion prevention systems. 6. Use endpoint detection and response (EDR) solutions on network management systems to detect signs of compromise or unauthorized configuration changes. 7. Educate users and administrators about the risks of IoT device compromise and enforce strict access controls and logging for device management interfaces. 8. Collaborate with ISPs and cybersecurity communities to share threat intelligence and coordinate takedown efforts against the botnet’s infrastructure. 9. Consider deploying DNS filtering to prevent infected devices from resolving C2 domains or IP addresses linked to KadNap. 10. Regularly review network traffic for proxying behavior that could indicate botnet activity and respond promptly to incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.lumen.com/silence-of-the-hops-the-kadnap-botnet"]
Adversary
null
Pulse Id
69b13da0db907023c1bfc480
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip45.135.180.177
ip212.104.141.140
ip45.135.180.38
ip154.7.253.12
CC=US ASN=AS397423 tier.net technologies llc
ip212.104.141.88
CC=GB ASN=AS206509 kcom group limited
ip79.141.161.152
CC=US ASN=AS202015 hz hosting ltd
ip85.158.111.100
CC=BE ASN=AS8368 destiny n.v
ip89.46.38.74
CC=RO ASN=AS41646 alternative commercial networks
ip91.193.19.226
CC=US ASN=AS202015 hz hosting ltd

Hash

ValueDescriptionCopy
hash0b3dbb951de7a216dd5032d783ba7d0a5ecda2bf872643c3a4ddd1667fb38ffe
hashebf9de6b67e94b2bd2b0dcda1941e04fef1a1dad830404813e468ab8744b7ed8

Threat ID: 69b140632f860ef9439004e1

Added to database: 3/11/2026, 10:13:55 AM

Last enriched: 3/11/2026, 10:29:10 AM

Last updated: 3/14/2026, 2:47:15 AM

Views: 293

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses