Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide

Posted on December 18, 2025December 18, 2025 By CWS

An enormous botnet concentrating on Android units has emerged as one of the crucial important threats within the cybersecurity panorama right now.

Named Kimwolf, this subtle malware has compromised roughly 1.8 million Android units worldwide, together with sensible TVs, set-top containers, tablets, and different Android-based programs.

Safety researchers found the botnet when a trusted group companion offered the preliminary pattern in October 2025, which used a command-and-control area ranked second in Cloudflare’s world area recognition rankings.

The botnet’s attain spans throughout 222 nations and areas, with the best focus of contaminated units in Brazil (14.63%), India (12.71%), and america (9.58%).

Contaminated units are distributed throughout a number of time zones worldwide, making complete monitoring difficult.

Kimwolf banner (Supply – Xlab)

The dimensions of this operation demonstrates the attackers’ skill to construct and preserve an enormous community infrastructure able to launching harmful cyberattacks on a world scale.

Xlab Qianxin analysts recognized Kimwolf as a extremely subtle botnet compiled utilizing the Android NDK, incorporating typical DDoS assault capabilities alongside proxy forwarding, reverse shell, and file administration capabilities.

The malware employs superior evasion strategies hardly ever noticed in comparable threats, together with the DNS over TLS (DoT) protocol to bypass conventional safety detection programs and elliptic-curve-based digital signature safety for command verification.

An infection mechanism

The an infection mechanism reveals fascinating technical particulars about how Kimwolf persists on compromised units. The malware operates via an APK file that extracts and executes a local binary payload disguised as official system providers.

Kimwolf Aisuru (Supply – Xlab)

Upon execution, it creates a Unix area socket named after the botnet model to make sure just one occasion runs concurrently on every system.

The malware then decrypts embedded command-and-control domains and makes use of the DoT protocol to question public DNS servers on port 853 to acquire actual C2 IP addresses, thereby concealing its communication patterns from community monitoring instruments.

High domains (Supply – Xlab)

To decrypt delicate information together with C2 addresses, Kimwolf employs Stack XOR operations on encrypted strings. Researchers efficiently automated the decryption course of utilizing emulation strategies, uncovering a number of hidden C2 domains embedded inside the binary.

The malware’s community communication all the time makes use of TLS encryption with a hard and fast Header Physique format containing magic values, message varieties, IDs, and CRC32 checksums.

Communication between contaminated bots and the C2 infrastructure follows a complicated three-stage handshake mechanism involving registration, verification, and affirmation phases.

The verification stage implements Elliptic Curve Digital Signature algorithms, guaranteeing solely authenticated instructions from official C2 servers are executed. This safety measure was particularly designed to stop unauthorized takedowns of the botnet infrastructure.

Between November 19 and 22, Kimwolf demonstrated its aggressive capabilities by issuing 1.7 billion DDoS assault instructions concentrating on numerous IP addresses globally.

The botnet helps 13 completely different DDoS assault strategies, together with UDP floods, TCP SYN floods, and SSL socket assaults, offering attackers with versatile choices for various goal eventualities.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Botnet, Devices, Hijacked, Kimwolf, Million, Worldwide

Post navigation

Previous Post: What Businesses Need to Know
Next Post: Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates

Related Posts

Miggo Security Named a Gartner® Cool Vendor in AI Security Cyber Security News
OpenVPN Driver Vulnerability Let Attackers to Crash Windows Systems Cyber Security News
Parrot 7.0 Released with New Penetration Testing and AI Tools Cyber Security News
New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time Cyber Security News
Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Cyber Security News
Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark