Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
KadNap Malware Uses Asus Routers for Stealth Botnet

KadNap Malware Uses Asus Routers for Stealth Botnet

Posted on March 10, 2026 By CWS

Cybersecurity experts have uncovered KadNap, a novel malware that primarily targets Asus routers, integrating them into a secretive botnet to redirect malicious network traffic. Detected initially in August 2025, KadNap has infected over 14,000 devices, with the majority situated in the United States, as reported by Black Lotus Labs at Lumen. Other affected regions include Taiwan, Hong Kong, Russia, and several European countries.

Advanced Techniques for Evasion

KadNap utilizes a modified Kademlia Distributed Hash Table (DHT) protocol to obscure the IP addresses of its infrastructure, effectively evading standard network surveillance. This peer-to-peer approach allows compromised devices to connect with a command-and-control (C2) server, enhancing resistance to disruption attempts. Once compromised, these devices are marketed through a proxy service known as Doppelgänger, a rebranded version of a similar service connected to TheMoon malware.

The operators of KadNap have not limited their attacks to Asus routers, targeting a variety of edge networking devices. A shell script, identified as “aic.sh,” is downloaded from the C2 server and is key in enlisting the devices into the botnet. The script executes hourly, renaming itself and establishing persistence on the device. Following this setup, a malicious ELF file is deployed, further integrating the device into the botnet.

Decentralized Network Control

KadNap also connects to a Network Time Protocol (NTP) server to synchronize time and track host uptime, which is used to generate hashes that identify peers within the network. This design facilitates the malware’s robust communication capabilities, making it challenging to disrupt as it blends with legitimate peer-to-peer traffic. Notably, not all compromised devices communicate with every C2 server, suggesting a categorized infrastructure based on the type and model of devices.

Black Lotus Labs notes that the bots, managed by Doppelgänger, are exploited by cybercriminals, complicating attribution due to potential co-infections with other malware. Users of small office and home office (SOHO) routers are advised to regularly update their devices, change default passwords, and replace outdated models to bolster security against such threats.

Emerging Linux Threat: ClipXDaemon

The KadNap discovery coincides with the emergence of a new Linux threat known as ClipXDaemon, a malware that targets cryptocurrency users by altering copied wallet addresses. Delivered through the ShadowHS framework, ClipXDaemon is a clipboard hijacker operating in Linux X11 environments. It monitors clipboard activity, replacing legitimate wallet addresses with those controlled by attackers.

ClipXDaemon avoids execution in Wayland sessions to reduce detection risk, as Wayland requires explicit user interaction for clipboard access. Unlike traditional malware, it operates without C2 logic or remote tasking, directly monetizing victims by hijacking wallet addresses in real-time.

These developments underline the growing sophistication of cyber threats, emphasizing the need for enhanced vigilance and updated security measures to protect vulnerable devices and networks.

The Hacker News Tags:Asus routers, Botnet, ClipXDaemon, Cybersecurity, DHT protocol, KadNap, Linux threat, Malware, network security, proxy service

Post navigation

Previous Post: Critical Ivanti Endpoint Manager Flaw Raises Security Concerns
Next Post: SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Related Posts

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks The Hacker News
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces The Hacker News
Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence The Hacker News
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed The Hacker News
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network The Hacker News
Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline
  • Hackers Target Cisco Devices with Known Vulnerabilities
  • ADT Faces Data Breach After ShinyHunters Claim
  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark