Home OSINT News Signals
CYBER

KadNap Malware Infects Over 14,000 Edge Devices to Power a Stealth Proxy Botnet

đź•“ 1 min read

A sophisticated malware campaign, dubbed KadNap, has successfully compromised more than 14,000 edge devices globally, transforming them into a covert proxy botnet. This large-scale infection primarily targets routers, gateways, and other internet-facing hardware, exploiting known vulnerabilities and weak credentials to gain a foothold. Once infected, these devices are silently enrolled into a network of residential proxies, which malicious actors can then sell or rent to other cybercriminals. This infrastructure is highly valuable for obfuscating the origin of attacks, conducting credential stuffing, ad fraud, and scraping restricted data, all while hiding behind the legitimate IP addresses of unsuspecting homeowners and businesses.

The KadNap malware demonstrates a high degree of operational sophistication. It is designed for stealth and persistence, often disabling security features on the compromised device and using multiple layers of obfuscation to evade detection by standard antivirus software. The botnet operates as a residential proxy service, meaning the infected devices use their legitimate, geographically dispersed IP addresses to relay traffic for the attackers. This makes malicious traffic appear to originate from ordinary, trusted residential networks, allowing it to bypass many security defenses that would block traffic from known datacenter or VPN IP ranges.

The scale of this botnet, with over 14,000 confirmed nodes, poses a significant threat to both individual users and the broader internet ecosystem. For the owners of infected devices, the risks include degraded network performance, potential exposure of local network traffic, and being implicated in cyberattacks. For enterprises and online platforms, the botnet facilitates a wide range of malicious activities, making it harder to distinguish between legitimate user traffic and automated attacks. This undermines fraud detection systems, web application firewalls, and rate-limiting controls that rely on IP reputation.

Cybersecurity experts recommend immediate action to mitigate the risk posed by KadNap and similar threats. Network administrators and individuals should ensure all edge devices are running the latest firmware, have default passwords changed to strong, unique credentials, and have remote management features disabled if not required. Monitoring for unusual network activity, such as spikes in outbound traffic or connections to unknown proxy ports, is also crucial. The discovery of the KadNap botnet underscores the critical importance of securing the often-overlooked perimeter of home and corporate networks—the humble router—which remains a prime target for cybercriminals seeking to build resilient, anonymous attack infrastructure.

Telegram X LinkedIn
Back to News