14,000 routers are infected by malware that’s highly resistant to takedowns



Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices—primarily made by Asus—that have been conscripted into a proxy network that anonymously carries traffic used for cybercrime.

The malware—dubbed KadNap—takes hold by exploiting vulnerabilities that have gone unpatched by their owners, Chris Formosa, a researcher at security firm Lumen’s Black Lotus Labs, told Ars. The high concentration of Asus routers is likely due to botnet operators acquiring a reliable exploit for vulnerabilities affecting those models. He said it’s unlikely that the attackers are using any zero-days in the operation.

A botnet that stands out among others

The number of infected routers averages about 14,000 per day, up from 10,000 last August, when Black Lotus discovered the botnet. Compromised devices are overwhelmingly located in the US, with smaller populations in Taiwan, Hong Kong, and Russia. One of the most salient features of KadNap is a sophisticated peer-to-peer design based on Kademlia, a network structure that uses distributed hash tables to conceal the IP addresses of command-and-control servers. The design makes the botnet resistant to detection and takedowns through traditional methods.

“The KadNap botnet stands out among others that support anonymous proxies in its use of a peer-to-peer network for decentralized control,” Formosa and fellow Black Lotus researcher Steve Rudd wrote Wednesday. “Their intention is clear: avoid detection and make it difficult for defenders to protect against.”

Distributed hash tables have long been used to create hardened peer-to-peer networks, most notably BitTorrent and the Inter-Planetary File System. Rather than having one or more centralized servers that directly control nodes and provide them with the IP addresses of other nodes, DHTs allow any node to poll other nodes for the device or server it’s looking for. The decentralized structure and the substitution of IP addresses with hashes give the network resilience against takedowns or denial of service attacks.



Source link

  • Related Posts

    Ford’s new AI assistant will help fleet owners know if seatbelts are being used

    Ford rolled out an AI assistant this week that can monitor and analyze millions of data points to help its Ford Pro commercial customers boost their bottom line. The bet,…

    Google Play will let you try a game before you buy it

    Google Play has introduced a new feature called Game Trials, which will let you play a portion of paid games for free before you commit to buying them. It’s now…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    WATCH: Massachusetts officer saves woman in distress from incoming train

    WATCH:  Massachusetts officer saves woman in distress from incoming train

    Ford’s new AI assistant will help fleet owners know if seatbelts are being used

    Ford’s new AI assistant will help fleet owners know if seatbelts are being used

    Bracketology Winners and Losers: How weak is the 2026 NCAA Tournament bubble? Just ask Texas and Auburn

    Bracketology Winners and Losers: How weak is the 2026 NCAA Tournament bubble? Just ask Texas and Auburn

    South Korea approves $350bn US investment package

    South Korea approves $350bn US investment package

    State lawmakers rush to set rounding rules for when there are no pennies

    State lawmakers rush to set rounding rules for when there are no pennies

    Pokémon Pokopia is such a “viral hit” that it’s making Nintendo’s share price surge (after months of going down)

    Pokémon Pokopia is such a “viral hit” that it’s making Nintendo’s share price surge (after months of going down)