Technology

Asus routers hijacked to power dangerous cybercrime proxy network - here's what we know

2026-03-11 15:45
434 views
Asus routers hijacked to power dangerous cybercrime proxy network - here's what we know

KadNap is being used to create Doppelgänger, a network with 14,000+ devices targeting Asus routers.

  1. Pro
  2. Security
Asus routers hijacked to power dangerous cybercrime proxy network - here's what we know News By Sead Fadilpašić published 11 March 2026

KadNap is being used against Asus routers

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard (Image credit: Getty Images)
  • Copy link
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
  • Email
Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Tech Radar Get the TechRadar Newsletter

Sign up for breaking news, reviews, opinion, top tech deals, and more.

Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

You are now subscribed

Your newsletter sign-up was successful

An account already exists for this email address, please log in. Subscribe to our newsletter
  • New KadNap malware infects 14,000+ routers
  • Botnet uses custom Kademlia DHT protocol for resilience
  • Proxy network Doppelgänger already active in the wild

A new malware strain has been found assimilating Asus routers into a botnet for malicious proxy traffic.

Security researchers Black Lotus spotted the new network, named KadNap, and warned that in less than a year it has managed to infect more than 14,000 devices, mostly made by Asus.

The attackers don’t seem to be targeting that manufacturer specifically, so it may be the case these products are relatively easy to compromise, or there are plenty of vulnerable devices out there, compared to competing endpoints. The majority of the victims (60%) are located in the US. The remaining 40% are split between Taiwan, Hong Kong, Russia, the UK, Australia, Brazil, France, Italy, and Spain.

Article continues below You may like
  • An Android phone being held in the hand A dangerous new Android backdoor has been found - Keenadu lurks in firmware, here's what we know
  • Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol A massive new DDoS botnet has already snared 1.8 million devices - here's what we know about Kimwolf
  • cables going into the back of a broadband router on white background This critical severity flaw in D-Link DSL gateway devices could allow for remote code execution

EDR killer

What makes this botnet unique is the use of the Kademlia Distributed Hash Table (DHT) protocol, a P2P network protocol used to store and find data across a decentralized network.

Instead of relying on a central server, millions of computers cooperate to locate files and information, making it quite resilient against possible law enforcement disruption efforts.

"KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to conceal the IP address of their infrastructure within a peer-to-peer system to evade traditional network monitoring," Black Lotus said in its report.

“The innovative use of the DHT protocol allows the malware to establish robust communication channels that are difficult to disrupt, by hiding in the noise of legitimate peer-to-peer traffic," they added.

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

KatNap is apparently used to build a proxy network called Doppelgänger which seems to be a rebrand of a previous network called Faceless. This one, the researchers say, was built using TheMoon malware.

The botnet is past the construction stage, since it is apparently already being used in the wild.

Via The Hacker News

Best antivirus software headerThe best antivirus for all budgetsOur top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sead FadilpašićSocial Links Navigation

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

View More

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more An Android phone being held in the hand A dangerous new Android backdoor has been found - Keenadu lurks in firmware, here's what we know    Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol A massive new DDoS botnet has already snared 1.8 million devices - here's what we know about Kimwolf    cables going into the back of a broadband router on white background This critical severity flaw in D-Link DSL gateway devices could allow for remote code execution    A close-up of an interent search bar with 'http://ww' visible NGINX servers hijacked in global campaign to redirect traffic    Digital crime by an anonymous hacker CISA reveals warning on Asus software flaw, here's what you need to do to stay safe    Trojan Dangerous WebRAT malware now being spread by GitHub repositories    Latest in Security WordPress logo on mobile Hackers hijack WordPress sites to spread malware using fake CAPTCHA    Someone using Excel on a Laptop. This 'fascinating' Microsoft Excel security flaw teams up spreadsheets and Copilot Agent to steal data    Hands on a laptop with overlaid logos representing network security HPE warns of dangerous security flaw which could allow Aruba OS password resets    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business Russian hackers target HR departments with vicious new 'BlackSanta' malware    Anthropic Claude ‘These actions are unprecedented and unlawful’: Anthropic sues Pentagon over “supply chain risk” designation — claims free speech and due process violations    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business Watch out Microsoft Teams users - hackers are spreading a dangerous new phishing scam, here's what we know    Latest in News Quordle on a smartphone held in a hand Quordle hints and answers for Thursday, March 12 (game #1508)    NYT Strands homescreen on a mobile phone screen, on a light blue background NYT Strands hints and answers for Thursday, March 12 (game #739)    NYT Connections homescreen on a phone, on a purple background NYT Connections hints and answers for Thursday, March 12 (game #1005)    A PC Gamer looking happy sat in front of their desktop monitor Intel's new Core Ultra 200S Plus CPUs promise a big boost for PC gamers    Sunny Nights How to watch Sunny Nights on TVNZ+ (it's *FREE*)    MacBook Air M5 hands on Why does the MacBook Air M5 keyboard look different? Blame your iPhone    LATEST ARTICLES