New KadNap Botnet Hijacks ASUS Routers to Fuel Cybercrime Proxy Network

New KadNap Botnet Hijacks ASUS Routers to Fuel Cybercrime Proxy Network

BleepingComputer
BleepingComputerMar 10, 2026

Why It Matters

KadNap expands the pool of compromised residential proxies, amplifying DDoS, credential‑stuffing and evasion capabilities for cybercriminals, and challenges traditional detection methods that rely on static C2 listings.

Key Takeaways

  • KadNap compromised ~14,000 ASUS routers since Aug 2025.
  • Uses custom Kademlia DHT to hide C2 servers.
  • 60% of bots located in United States.
  • Powers Doppelganger residential proxy service for illicit traffic.
  • Lumen blocked traffic and released IOCs for mitigation.

Pulse Analysis

The emergence of KadNap highlights a growing trend where attackers weaponize consumer‑grade networking hardware to build resilient botnets. By hijacking ASUS routers, the malware gains a foothold in home broadband environments, leveraging the devices’ always‑on connectivity and NAT traversal capabilities. Its use of a modified Kademlia Distributed Hash Table creates a peer‑to‑peer overlay that obscures the location of command‑and‑control servers, rendering conventional blacklist approaches less effective and forcing defenders to adopt graph‑based detection techniques.

Beyond the technical novelty, KadNap’s integration with the Doppelganger proxy marketplace underscores the monetization of compromised infrastructure. Residential proxies sourced from hijacked routers provide attackers with low‑latency, geographically diverse exit points, ideal for launching distributed denial‑of‑service attacks, credential‑stuffing campaigns, and bypassing IP‑based defenses. The service’s rebranding from the earlier Faceless platform indicates an evolving business model where botnet operators package access as a subscription service, blurring the line between traditional malware and cybercrime‑as‑a‑service.

Industry response is critical to curtailing this threat. Lumen’s proactive traffic blocking demonstrates the value of network‑level interventions, while the forthcoming release of indicators of compromise equips other providers and enterprises with actionable intelligence. Organizations should prioritize firmware hygiene on consumer routers, enforce regular updates, and monitor for anomalous outbound connections to NTP or unknown DHT nodes. Collaborative threat‑sharing and rapid containment can mitigate the spread of KadNap and reduce the pool of devices available for illicit proxy services.

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

Comments

Want to join the conversation?

Loading comments...