KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
嗯,用户让我用中文总结一下这篇文章的内容,控制在100个字以内,而且不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。好的,我先仔细阅读一下文章内容。 文章主要讲的是研究人员发现了一种新的恶意软件KadNap,主要针对华硕路由器,将其加入僵尸网络用于代理恶意流量。KadNap使用了Kademlia分布式哈希表协议来隐藏基础设施的IP地址,逃避传统监控。被感染的设备会连接到命令控制服务器,并且被用来提供匿名代理服务。此外,还提到了另一种针对Linux用户的恶意软件ClipXDaemon,专门窃取加密货币钱包地址。 接下来,我需要把这些关键点浓缩到100字以内。首先,KadNap的主要目标是华硕路由器,利用DHT协议隐藏IP地址。然后是感染数量和分布情况,接着是代理服务Doppelgänger的情况。最后提到另一种威胁ClipXDaemon。 可能的结构是:研究人员发现新恶意软件KadNap攻击华硕路由器,利用DHT协议隐藏IP地址;已感染超1.4万台设备;被用于代理恶意流量;同时新Linux威胁ClipXDaemon出现。 这样大概在100字左右了。检查一下是否遗漏了关键信息:感染数量、地理位置、DHT协议的作用、代理服务、以及另一种威胁的存在。看起来都涵盖了。 最后再调整一下语言使其更流畅自然。 </think> 研究人员发现新恶意软件KadNap攻击华硕路由器并将其加入僵尸网络用于代理恶意流量;该软件利用Kademlia协议隐藏基础设施IP地址以逃避监测;已感染超1.4万台设备;同时新Linux威胁ClipXDaemon出现。 2026-3-10 16:0:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic.

The malware, first detected in the wild in August 2025, has expanded to over 14,000 infected devices, with more than 60% of victims located in the U.S., according to the Black Lotus Labs team at Lumen. A lesser number of infections have been detected in Taiwan, Hong Kong, Russia, the U.K., Australia, Brazil, France, Italy, and Spain.

"KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to conceal the IP address of their infrastructure within a peer-to-peer system to evade traditional network monitoring," the cybersecurity company said in a report shared with The Hacker News.

Compromised nodes in the network leverage the DHT protocol to locate and connect with a command-and-control (C2) server, thereby making it resilient to detection and disruption efforts.

Once devices are successfully compromised, they are marketed by a proxy service named Doppelgänger ("doppelganger[.]shop"), which is assessed to be a rebrand of Faceless, another proxy service associated with TheMoon malware. Doppelgänger, according to its website, claims to offer resident proxies in over 50 countries that provide "100% anonymity." The service is said to have launched in May/June 2025.

Despite the focus on Asus routers, the operators of KadNap have been found to deploy the malware against an assorted set of edge networking devices.

Central to the attack is a shell script ("aic.sh") that's downloaded from the C2 server ("212.104.141[.]140"), which is responsible for initiating the process of conscripting the victim to the P2P network. The file creates a cron job to retrieve the shell script from the server at the 55-minute mark of every hour, rename it to ".asusrouter," and run it.

Once persistence is established, the script pulls a malicious ELF file, renames it to "kad," and executes it. This, in turn, leads to the deployment of KadNap. The malware is capable of targeting devices running both ARM and MIPS processors.

KadNap is also designed to connect to a Network Time Protocol (NTP) server to fetch the current time and store it along with the host uptime. This information serves as a basis to create a hash that's used to locate other peers in the decentralized network to receive commands or download additional files.

The files – fwr.sh and /tmp/.sose – contains functionality to close port 22, the standard TCP port for Secure Shell (SSH), on the infected device and extract a list of C2 IP address:port combinations to connect to.

"In short, the innovative use of the DHT protocol allows the malware to establish robust communication channels that are difficult to disrupt, by hiding in the noise of legitimate peer-to-peer traffic," Lumen said.

Further analysis has determined that not all compromised devices communicate with every C2 server, indicating the infrastructure is being categorized based on device type and models.

The Black Lotus Labs team told The Hacker News that Doppelgänger's bots are being abused by threat actors in the wild. "One issue there has been since these Asus (and other devices) are also sometimes co-infected with other malware, it is tricky to say who exactly is responsible for a specific malicious activity," the company said.

Users running SOHO routers are advised to keep their devices up to date, reboot them regularly, change default passwords, secure management interfaces, and replace models that are end-of-life and are no longer supported.

"The KadNap botnet stands out among others that support anonymous proxies in its use of a peer-to-peer network for decentralized control," Lumen concluded. "Their intention is clear, avoid detection and make it difficult for defenders to protect against."

New Linux Threat ClipXDaemon Emerges

The disclosure comes as Cyble detailed a new Linux threat dubbed ClipXDaemon that's designed to target cryptocurrency users by intercepting and altering copied wallet addresses. The clipper malware, delivered via Linux post-exploitation framework called ShadowHS, has been described as an autonomous cryptocurrency clipboard hijacker targeting Linux X11 environments.

Staged entirely in memory, the malware employs stealth techniques, such as process masquerading and Wayland session avoidance, while simultaneously monitoring the clipboard every 200 milliseconds and substituting cryptocurrency addresses with attacker-controlled wallets. It's capable of targeting Bitcoin, Ethereum, Litecoin, Monero, Tron, Dogecoin, Ripple, and TON wallets.

The decision to avoid execution in Wayland sessions is deliberate, as the display server protocol's security architecture places additional controls, like requiring explicit user interaction, before applications can access the clipboard content. In disabling itself under such scenarios, the malware aims to eliminate noise and avoid runtime failure.

"ClipXDaemon differs fundamentally from traditional Linux malware. It contains no command-and-control (C2) logic, performs no beaconing, and requires no remote tasking," the company said. "Instead, it monetizes victims directly by hijacking cryptocurrency wallet addresses copied in X11 sessions and replacing them in real time with attacker-controlled addresses."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.html
如有侵权请联系:admin#unsafe.sh