Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide

Posted on December 18, 2025December 18, 2025 By CWS

An enormous botnet concentrating on Android units has emerged as one of the crucial important threats within the cybersecurity panorama right now.

Named Kimwolf, this subtle malware has compromised roughly 1.8 million Android units worldwide, together with sensible TVs, set-top containers, tablets, and different Android-based programs.

Safety researchers found the botnet when a trusted group companion offered the preliminary pattern in October 2025, which used a command-and-control area ranked second in Cloudflare’s world area recognition rankings.

The botnet’s attain spans throughout 222 nations and areas, with the best focus of contaminated units in Brazil (14.63%), India (12.71%), and america (9.58%).

Contaminated units are distributed throughout a number of time zones worldwide, making complete monitoring difficult.

Kimwolf banner (Supply – Xlab)

The dimensions of this operation demonstrates the attackers’ skill to construct and preserve an enormous community infrastructure able to launching harmful cyberattacks on a world scale.

Xlab Qianxin analysts recognized Kimwolf as a extremely subtle botnet compiled utilizing the Android NDK, incorporating typical DDoS assault capabilities alongside proxy forwarding, reverse shell, and file administration capabilities.

The malware employs superior evasion strategies hardly ever noticed in comparable threats, together with the DNS over TLS (DoT) protocol to bypass conventional safety detection programs and elliptic-curve-based digital signature safety for command verification.

An infection mechanism

The an infection mechanism reveals fascinating technical particulars about how Kimwolf persists on compromised units. The malware operates via an APK file that extracts and executes a local binary payload disguised as official system providers.

Kimwolf Aisuru (Supply – Xlab)

Upon execution, it creates a Unix area socket named after the botnet model to make sure just one occasion runs concurrently on every system.

The malware then decrypts embedded command-and-control domains and makes use of the DoT protocol to question public DNS servers on port 853 to acquire actual C2 IP addresses, thereby concealing its communication patterns from community monitoring instruments.

High domains (Supply – Xlab)

To decrypt delicate information together with C2 addresses, Kimwolf employs Stack XOR operations on encrypted strings. Researchers efficiently automated the decryption course of utilizing emulation strategies, uncovering a number of hidden C2 domains embedded inside the binary.

The malware’s community communication all the time makes use of TLS encryption with a hard and fast Header Physique format containing magic values, message varieties, IDs, and CRC32 checksums.

Communication between contaminated bots and the C2 infrastructure follows a complicated three-stage handshake mechanism involving registration, verification, and affirmation phases.

The verification stage implements Elliptic Curve Digital Signature algorithms, guaranteeing solely authenticated instructions from official C2 servers are executed. This safety measure was particularly designed to stop unauthorized takedowns of the botnet infrastructure.

Between November 19 and 22, Kimwolf demonstrated its aggressive capabilities by issuing 1.7 billion DDoS assault instructions concentrating on numerous IP addresses globally.

The botnet helps 13 completely different DDoS assault strategies, together with UDP floods, TCP SYN floods, and SSL socket assaults, offering attackers with versatile choices for various goal eventualities.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Botnet, Devices, Hijacked, Kimwolf, Million, Worldwide

Post navigation

Previous Post: What Businesses Need to Know
Next Post: Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates

Related Posts

IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript Cyber Security News
PoC Exploit Unveiled for Lenovo Code Execution Vulnerability Enabling Privilege Escalation Cyber Security News
HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks Cyber Security News
Microsoft Exchange Server Vulnerability Enables Privelege Escalation Cyber Security News
AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • IoT Security Firm Exein Raises €100 Million
  • Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data
  • SonicWall Patches Exploited SMA 1000 Zero-Day
  • Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • IoT Security Firm Exein Raises €100 Million
  • Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data
  • SonicWall Patches Exploited SMA 1000 Zero-Day
  • Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark