Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
KadNap Malware Uses Asus Routers for Stealth Botnet

KadNap Malware Uses Asus Routers for Stealth Botnet

Posted on March 10, 2026 By CWS

Cybersecurity experts have uncovered KadNap, a novel malware that primarily targets Asus routers, integrating them into a secretive botnet to redirect malicious network traffic. Detected initially in August 2025, KadNap has infected over 14,000 devices, with the majority situated in the United States, as reported by Black Lotus Labs at Lumen. Other affected regions include Taiwan, Hong Kong, Russia, and several European countries.

Advanced Techniques for Evasion

KadNap utilizes a modified Kademlia Distributed Hash Table (DHT) protocol to obscure the IP addresses of its infrastructure, effectively evading standard network surveillance. This peer-to-peer approach allows compromised devices to connect with a command-and-control (C2) server, enhancing resistance to disruption attempts. Once compromised, these devices are marketed through a proxy service known as Doppelgänger, a rebranded version of a similar service connected to TheMoon malware.

The operators of KadNap have not limited their attacks to Asus routers, targeting a variety of edge networking devices. A shell script, identified as “aic.sh,” is downloaded from the C2 server and is key in enlisting the devices into the botnet. The script executes hourly, renaming itself and establishing persistence on the device. Following this setup, a malicious ELF file is deployed, further integrating the device into the botnet.

Decentralized Network Control

KadNap also connects to a Network Time Protocol (NTP) server to synchronize time and track host uptime, which is used to generate hashes that identify peers within the network. This design facilitates the malware’s robust communication capabilities, making it challenging to disrupt as it blends with legitimate peer-to-peer traffic. Notably, not all compromised devices communicate with every C2 server, suggesting a categorized infrastructure based on the type and model of devices.

Black Lotus Labs notes that the bots, managed by Doppelgänger, are exploited by cybercriminals, complicating attribution due to potential co-infections with other malware. Users of small office and home office (SOHO) routers are advised to regularly update their devices, change default passwords, and replace outdated models to bolster security against such threats.

Emerging Linux Threat: ClipXDaemon

The KadNap discovery coincides with the emergence of a new Linux threat known as ClipXDaemon, a malware that targets cryptocurrency users by altering copied wallet addresses. Delivered through the ShadowHS framework, ClipXDaemon is a clipboard hijacker operating in Linux X11 environments. It monitors clipboard activity, replacing legitimate wallet addresses with those controlled by attackers.

ClipXDaemon avoids execution in Wayland sessions to reduce detection risk, as Wayland requires explicit user interaction for clipboard access. Unlike traditional malware, it operates without C2 logic or remote tasking, directly monetizing victims by hijacking wallet addresses in real-time.

These developments underline the growing sophistication of cyber threats, emphasizing the need for enhanced vigilance and updated security measures to protect vulnerable devices and networks.

The Hacker News Tags:Asus routers, Botnet, ClipXDaemon, Cybersecurity, DHT protocol, KadNap, Linux threat, Malware, network security, proxy service

Post navigation

Previous Post: Critical Ivanti Endpoint Manager Flaw Raises Security Concerns
Next Post: SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Related Posts

Why Business Impact Should Lead the Security Conversation Why Business Impact Should Lead the Security Conversation The Hacker News
New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves The Hacker News
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers The Hacker News
Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More The Hacker News
AI Agents Are Becoming Privilege Escalation Paths AI Agents Are Becoming Privilege Escalation Paths The Hacker News
10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News