Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide

Posted on December 18, 2025December 18, 2025 By CWS

An enormous botnet concentrating on Android units has emerged as one of the crucial important threats within the cybersecurity panorama right now.

Named Kimwolf, this subtle malware has compromised roughly 1.8 million Android units worldwide, together with sensible TVs, set-top containers, tablets, and different Android-based programs.

Safety researchers found the botnet when a trusted group companion offered the preliminary pattern in October 2025, which used a command-and-control area ranked second in Cloudflare’s world area recognition rankings.

The botnet’s attain spans throughout 222 nations and areas, with the best focus of contaminated units in Brazil (14.63%), India (12.71%), and america (9.58%).

Contaminated units are distributed throughout a number of time zones worldwide, making complete monitoring difficult.

Kimwolf banner (Supply – Xlab)

The dimensions of this operation demonstrates the attackers’ skill to construct and preserve an enormous community infrastructure able to launching harmful cyberattacks on a world scale.

Xlab Qianxin analysts recognized Kimwolf as a extremely subtle botnet compiled utilizing the Android NDK, incorporating typical DDoS assault capabilities alongside proxy forwarding, reverse shell, and file administration capabilities.

The malware employs superior evasion strategies hardly ever noticed in comparable threats, together with the DNS over TLS (DoT) protocol to bypass conventional safety detection programs and elliptic-curve-based digital signature safety for command verification.

An infection mechanism

The an infection mechanism reveals fascinating technical particulars about how Kimwolf persists on compromised units. The malware operates via an APK file that extracts and executes a local binary payload disguised as official system providers.

Kimwolf Aisuru (Supply – Xlab)

Upon execution, it creates a Unix area socket named after the botnet model to make sure just one occasion runs concurrently on every system.

The malware then decrypts embedded command-and-control domains and makes use of the DoT protocol to question public DNS servers on port 853 to acquire actual C2 IP addresses, thereby concealing its communication patterns from community monitoring instruments.

High domains (Supply – Xlab)

To decrypt delicate information together with C2 addresses, Kimwolf employs Stack XOR operations on encrypted strings. Researchers efficiently automated the decryption course of utilizing emulation strategies, uncovering a number of hidden C2 domains embedded inside the binary.

The malware’s community communication all the time makes use of TLS encryption with a hard and fast Header Physique format containing magic values, message varieties, IDs, and CRC32 checksums.

Communication between contaminated bots and the C2 infrastructure follows a complicated three-stage handshake mechanism involving registration, verification, and affirmation phases.

The verification stage implements Elliptic Curve Digital Signature algorithms, guaranteeing solely authenticated instructions from official C2 servers are executed. This safety measure was particularly designed to stop unauthorized takedowns of the botnet infrastructure.

Between November 19 and 22, Kimwolf demonstrated its aggressive capabilities by issuing 1.7 billion DDoS assault instructions concentrating on numerous IP addresses globally.

The botnet helps 13 completely different DDoS assault strategies, together with UDP floods, TCP SYN floods, and SSL socket assaults, offering attackers with versatile choices for various goal eventualities.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Botnet, Devices, Hijacked, Kimwolf, Million, Worldwide

Post navigation

Previous Post: What Businesses Need to Know
Next Post: Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates

Related Posts

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Cyber Security News
Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Cyber Security News
How a Faulty Windows Driver Can Cause a System Crash and Blue Screen of Death Cyber Security News
Chinese MURKY PANDA Attacking Government and Professional Services Entities Cyber Security News
ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration Cyber Security News
A Scalable Solution for Global Privileged Access Management Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark