Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Proxy. Show all posts

KadNap Malware Compromises Over 14,000 Edge Devices to Operate Hidden Proxy Botnet

 


Cybersecurity researchers have identified a previously undocumented malware strain called KadNap that is primarily infecting Asus routers and other internet-facing networking devices. The attackers are using these compromised systems to form a botnet that routes malicious traffic through residential connections, effectively turning infected hardware into anonymous proxy nodes.

The threat was first observed in real-world attacks in August 2025. Since that time, the number of affected devices has grown to more than 14,000, according to investigators at Black Lotus Labs. A large share of infections, exceeding 60 percent, has been detected within the United States. Smaller groups of compromised devices have also been identified across Taiwan, Hong Kong, Russia, the United Kingdom, Australia, Brazil, France, Italy, and Spain.

Researchers report that the malware uses a modified version of the Kademlia Distributed Hash Table (DHT) protocol. This peer-to-peer networking technology enables the attackers to conceal the true location of their infrastructure by distributing communication across multiple nodes. By embedding command traffic inside decentralized peer-to-peer activity, the operators can evade traditional network monitoring systems that rely on detecting centralized servers.

Within this architecture, infected devices communicate with one another using the DHT network to discover and establish connections with command-and-control servers. This design improves the botnet’s resilience, as it reduces the chances that defenders can disable operations by shutting down a single control point.

Once a router or other edge device has been compromised, the system can be sold or rented through a proxy platform known as Doppelgänger. Investigators believe this service is a rebranded version of another proxy operation called Faceless, which previously had links to TheMoon router malware. According to information published on the Doppelgänger website, the service launched around May or June 2025 and advertises access to residential proxy connections in more than 50 countries, promoting what it claims is complete anonymity for users.

Although many of the observed infections involve Asus routers, researchers found that the malware operators are also capable of targeting a wider range of edge networking equipment.

The attack chain begins with the download of a shell script named aic.sh, retrieved from a command server located at 212.104.141[.]140. This script initiates the infection process by connecting the compromised device to the botnet’s peer-to-peer network.

To ensure the malware remains active, the script establishes persistence by creating a cron task that downloads the same script again at the 55-minute mark of every hour. During this process, the file is renamed “.asusrouter” and executed automatically.

After persistence is secured, the script downloads an ELF executable, renames it “kad,” and runs it on the device. This program installs the KadNap malware itself. The malware is capable of operating on hardware that uses ARM and MIPS processor architectures, which are commonly found in routers and networking appliances.

KadNap also contacts a Network Time Protocol (NTP) server to retrieve the current system time and store it along with the device’s uptime. These values are combined to produce a hash that allows the malware to identify and connect with other peers within the decentralized network, enabling it to receive commands or download additional components.

Two additional files used during the infection process, fwr.sh and /tmp/.sose, contain instructions that close port 22, which is the default port used by Secure Shell (SSH). These files also extract lists of command server addresses in IP-address-and-port format, which the malware uses to establish communication with control infrastructure.

According to researchers, the use of the DHT protocol provides the botnet with durable communication channels that are difficult to shut down because its traffic blends with legitimate peer-to-peer network activity.

Further examination revealed that not every infected device communicates with every command server. This suggests the attackers are segmenting their infrastructure, possibly grouping devices based on hardware type or model.

Investigators also noted that routers infected with KadNap may sometimes contain multiple malware infections simultaneously. Because of this overlap, it can be challenging to determine which threat actor is responsible for particular malicious activity originating from those systems.

Security experts recommend that individuals and organizations operating small-office or home-office (SOHO) routers take several precautions. These include installing firmware updates, restarting devices periodically, replacing default administrator credentials, restricting management access, and replacing routers that have reached end-of-life status and no longer receive security patches.

Researchers concluded that KadNap’s reliance on a peer-to-peer command structure distinguishes it from many other proxy-based botnets designed to provide anonymity services. The decentralized approach allows operators to remain hidden while making it significantly harder for defenders to detect and block the network.

In a separate report, security analysts at Cyble disclosed a new Linux malware threat named ClipXDaemon.

The malware targets cryptocurrency users by intercepting wallet addresses that victims copy to their clipboard and secretly replacing them with addresses controlled by attackers. This type of threat is commonly known as clipper malware.

ClipXDaemon is distributed through a Linux post-exploitation framework called ShadowHS and has been described as an automated clipboard-hijacking tool designed specifically for systems running Linux X11 graphical environments.

The malware operates entirely in memory, which reduces traces on disk and improves its ability to remain undetected. It also employs several stealth techniques, including disguising its process names and deliberately avoiding execution in Wayland sessions.

This design choice is intentional because Wayland’s security architecture introduces stricter restrictions on clipboard access. Applications must usually involve explicit user interaction before they can read clipboard contents. By disabling itself when Wayland is detected, the malware avoids triggering errors or suspicious behavior.

Once active in an X11 session, ClipXDaemon continuously checks the system clipboard every 200 milliseconds. If it detects a copied cryptocurrency wallet address, it immediately substitutes it with an attacker-controlled address before the victim pastes the information.

The malware currently targets a wide range of digital currencies, including Bitcoin, Ethereum, Litecoin, Monero, Tron, Dogecoin, Ripple, and TON.

Researchers noted that ClipXDaemon differs significantly from traditional Linux malware families. It does not include command-and-control communication, does not send beaconing signals to remote servers, and does not rely on external instructions to operate.

Instead, the malware generates profits directly by manipulating cryptocurrency transactions in real time, silently redirecting funds when victims paste compromised wallet addresses during transfers.

Proxy Servers: How They Work and What They Actually Do



When browsing online, your device usually connects directly to a website’s server. However, in certain cases, especially for privacy, security, or access control — a proxy server acts as a go-between. It stands between your device and the internet, forwarding your web requests and returning responses while showing its own public IP address instead of yours.

According to the U.S. National Institute of Standards and Technology (NIST), a proxy server is essentially a system that handles requests from clients and forwards them to other servers. In simple terms, it’s a digital middleman that manages the communication between you and the websites you visit.


How a Proxy Server Operates

Here’s how the process works:

1. Your computer or device sends a request to the proxy server instead of directly contacting a website.

2. The proxy then forwards that request to the destination site.

3. The site responds to the proxy.

4. The proxy returns the data to your device.

From your perspective, it looks like a normal browsing session, but from the website’s end, the request appears to come from the proxy’s IP address. Proxies can exist as physical network devices or as cloud-based services that users configure through system or browser settings.

Companies often use “reverse proxies” to manage and filter incoming traffic to their web servers. These reverse proxies can block malicious activity, balance heavy traffic loads, and improve performance by caching frequently accessed pages.


Why People Use Proxy Servers

Proxy servers are used for several reasons. They provide a basic layer of privacy by hiding your actual IP address and limiting what websites can track about you. They can also make it appear that you’re browsing from another location, allowing access to region-locked content or websites blocked in your area.

In workplaces and educational institutions, proxies help administrators restrict certain sites, monitor browsing activity, and reduce bandwidth consumption by storing copies of commonly visited web pages. Large organizations also rely on proxies to safeguard internal systems and regulate how employees connect to external networks.


The Limitations and Risks

Despite their advantages, proxy servers have notable limits. They do not encrypt your internet traffic, which means that if your connection is not secured through HTTPS, the information passing through can still be intercepted. Free or public proxy services pose particular risks, they often slow down browsing, log user activity, inject advertisements, or even harvest data for profit.

For users seeking genuine privacy or security, experts recommend using paid, reputable proxy services or opting for a Virtual Private Network (VPN). VPNs extend the idea of a proxy by adding encryption, ensuring that all traffic between the user and the internet is protected.


Proxy vs. VPN vs. NAT

Although proxies, VPNs, and Network Address Translation (NAT) all sit between your device and the wider web, they function differently.

• Proxy: Masks your IP address and filters traffic but does not encrypt your connection.

• VPN: Encrypts all online activity and provides a stronger layer of privacy and security.

• NAT: Operates within routers, allowing multiple devices in a household or office to share one public IP address. It’s a background process, not a privacy tool.

Proxy servers are practical tools for managing internet access, optimizing traffic, and adding basic privacy. However, they should not be mistaken for comprehensive security solutions. Users should view proxies as one layer of digital protection, effective when used properly, but insufficient on their own. For strong privacy, encryption, and security, a VPN remains the more reliable choice.



2.8 million IP Addresses Being Leveraged in Brute Force Assault On VPNs

 

Almost 2.8 million IP addresses are being used in a massive brute force password attack that aims to guess the login credentials for a variety of networking devices, including those generated by Palo Alto Networks, Ivanti, and SonicWall.

A brute force assault occurs when an attacker attempts to repeatedly log into an account or device with many usernames and passwords until the correct combination is found. Once the malicious actors access the right credentials, they can use them to access a network or take control of a device.

The Shadowserver Foundation, a threat monitoring platform, reports that a brute force attack has been going on since last month, using around 2.8 million source IP addresses every day to carry out these attacks. Brazil accounts for the majority of them (1.1 million), with Turkey, Russia, Argentina, Morocco, and Mexico following closely behind. However, a very big range of countries of origin generally participate in the activity.

These are edge security equipment, such as firewalls, VPNs, gateways, and other security appliances, which are frequently exposed to the internet to allow remote access. The devices used in these attacks are predominantly MikroTik, Huawei, Cisco, Boa, and ZTE routers and IoTs, which are frequently hacked by big malware botnets. 

The Shadowserver Foundation stated to the local media outlet that the activity has persisted for some time but has recently escalated significantly. ShadowServer also indicated that the attacking IP addresses are distributed across various networks and Autonomous Systems, suggesting the involvement of a botnet or an operation linked to residential proxy networks. 

Residential proxies are IP addresses allocated to individual customers of Internet Service Providers (ISPs), rendering them highly desirable for cybercrime, data scraping, circumvention of geo-restrictions, ad verification, and ticket scalping, among other uses. 

These proxies redirect internet traffic over residential networks, giving the impression that the user is a typical home user rather than a bot, data scraper, or hacker. Gateway devices targeted by this activity may be utilised as proxy exit nodes in residential proxying operations, passing malicious traffic through an organization's enterprise network. These nodes are rated "high-quality" because the organisations have a good reputation and the assaults are more challenging to identify and stop. 

Changing the default admin password to a strong and distinct one, implementing multi-factor authentication (MFA), employing an allowlist of trustworthy IPs, and turning down web admin interfaces when not in use are some ways to defend edge devices against brute-forcing assaults. In the end, patching those devices with the most latest firmware and security upgrades is essential to eliminating flaws that threat actors could use to gain initial access.