KadNap Botnet Hijacks 14,000+ ASUS Routers for Proxy Network
Security researchers expose KadNap malware targeting ASUS routers to build a criminal proxy network. 60% of infected devices located in the US, linked to Doppelganger service.
A botnet called KadNap has compromised over 14,000 ASUS routers and edge networking devices since August 2025, turning them into a proxy network that cybercriminals rent for DDoS attacks, credential stuffing, and traffic obfuscation. Lumen Technologies researchers tracked the operation and have begun blocking all traffic to the botnet's control infrastructure.
How KadNap Infects Routers
The infection begins with a shell script named "aic.sh" downloaded from the command server. This script creates a cron job that runs every 55 minutes, retrieving updates and maintaining persistence across router reboots. The script renames itself to ".asusrouter"—a hidden file that blends with legitimate ASUS configuration files.
Once persistence is established, the script downloads an ELF binary named "kad" that installs the botnet client. The malware targets devices running both ARM and MIPS processors, covering the majority of consumer and small business networking equipment.
After installation, KadNap determines the host's external IP address and contacts NTP servers to synchronize timing data. This timing coordination suggests the botnet operators need precise scheduling across their proxy network, likely for coordinated attacks or to avoid detection through behavioral analysis.
Kademlia DHT: Hiding in Plain Sight
KadNap's most notable feature is its use of a custom Kademlia Distributed Hash Table protocol for command and control. Rather than pointing infected devices at a single server that defenders could block, the malware distributes C2 information across a peer-to-peer network.
This makes traditional domain or IP-based blocking largely ineffective. Infected routers discover new C2 nodes through the DHT, and the infrastructure can shift without pushing updates to every bot. We've seen similar P2P C2 techniques used by North Korean actors targeting FortiGate devices, suggesting the approach is gaining popularity among sophisticated threat actors.
However, Lumen researchers found a weakness: KadNap consistently connects to two specific nodes before reaching the actual C2 infrastructure. This architectural shortcut reduces the decentralization benefits and gives defenders a chokepoint for detection and blocking.
The Doppelganger Connection
The KadNap botnet feeds into the Doppelganger proxy service, believed to be a rebrand of the defunct Faceless service previously linked to the TheMoon malware operation. Doppelganger sells access to infected devices as "residential proxies"—IP addresses that appear to originate from legitimate home internet connections rather than known data centers or VPN providers.
These residential proxies command premium prices because they:
- Evade IP-based blocking and rate limiting
- Bypass geographic restrictions
- Obscure the true source of attacks
- Make credential stuffing and account takeover more effective
Cybercriminals using Doppelganger can route their traffic through thousands of compromised home routers, making attribution and blocking extremely difficult for target organizations.
Geographic Distribution
The infection pattern isn't random. Sixty percent of compromised devices are located in the United States, with significant clusters in Taiwan, Hong Kong, and Russia. The US concentration likely reflects both the popularity of ASUS routers in the American market and the premium value of US-based residential IP addresses for bypassing American services.
This geographic targeting echoes patterns we've covered in threat intelligence reports showing US credentials and access selling at higher prices on dark web marketplaces. American IP addresses simply open more doors.
Why This Matters
Router botnets represent a persistent blind spot in enterprise security. Organizations focus on endpoint detection, email filtering, and network segmentation while traffic from employee home routers—now often part of corporate network paths thanks to remote work—goes largely unmonitored.
A compromised home router can:
- Intercept unencrypted traffic
- Redirect DNS queries
- Serve as a pivot point into corporate VPNs
- Generate malicious traffic that appears to originate from legitimate employees
The 14,000+ device count makes KadNap mid-sized by botnet standards, but the residential proxy angle amplifies its impact. Each infected router potentially facilitates hundreds of attacks against other organizations.
Mitigation Steps
Lumen Technologies is blocking KadNap traffic across their network and plans to publish indicators of compromise publicly. For ASUS router owners:
- Update firmware immediately - Check the ASUS support site for your model
- Disable remote management - Unless absolutely necessary for your use case
- Check for unusual cron jobs - Look for hidden files in system directories
- Monitor outbound traffic - Unexpected connections to non-standard ports may indicate compromise
- Consider router replacement - Older models no longer receiving updates should be retired
Enterprise security teams should assume some percentage of remote workers have compromised home network equipment. Zero trust architectures that don't implicitly trust traffic based on source IP become more important as router botnets proliferate.
Related Articles
KadNap Malware Hijacks 14,000 Routers for Underground Proxy Network
New KadNap botnet targets Asus routers using peer-to-peer Kademlia protocol for stealth C2. Over 60% of infections in the US, linked to Faceless proxy service.
Mar 11, 2026Aeternum Botnet Uses Polygon Blockchain as Takedown-Proof C2
New botnet loader stores encrypted commands in smart contracts on Polygon, making traditional infrastructure takedowns ineffective. Operating costs are under $1 for 100+ commands.
Feb 28, 2026SSHStalker Botnet Compromises 7,000 Linux Servers via SSH
New Linux botnet SSHStalker infected 7,000 cloud servers using brute-force SSH attacks and 2009-era kernel exploits. Uses IRC for command-and-control while apparently staging for future operations.
Feb 12, 2026FBI: BadBox 2.0 Malware Pre-Installed on 1M+ Android Devices
Budget Android TV boxes and tablets ship with backdoors from the factory, turning home networks into criminal infrastructure for ad fraud and proxy services.
Jan 18, 2026