Executive Summary
In August 2025, cybersecurity researchers identified a new malware strain named KadNap, which primarily targets ASUS routers and other edge networking devices. The malware infiltrates these devices, transforming them into nodes within a botnet that proxies malicious traffic. KadNap employs a customized version of the Kademlia Distributed Hash Table (DHT) protocol, enabling decentralized communication and complicating efforts to detect and disrupt its command-and-control (C2) infrastructure. By March 2026, the botnet had expanded to over 14,000 infected devices, with approximately 60% located in the United States. (bleepingcomputer.com)
The emergence of KadNap underscores a growing trend of sophisticated malware leveraging decentralized protocols to enhance resilience against traditional network monitoring and takedown efforts. This incident highlights the critical need for robust security measures in consumer-grade networking equipment, as such devices are increasingly exploited to facilitate large-scale cybercriminal operations.
Why This Matters Now
The KadNap botnet's rapid expansion and sophisticated evasion techniques exemplify the evolving threat landscape, where attackers increasingly target consumer networking devices to build resilient infrastructures for malicious activities. This trend necessitates immediate attention to the security of home and small office routers to prevent their exploitation in cybercrime networks.
Attack Path Analysis
The KadNap botnet initiates its attack by exploiting vulnerabilities in ASUS routers to gain unauthorized access. Once compromised, the malware establishes persistence through scheduled tasks and deploys a custom Kademlia-based protocol for resilient command and control communication. The infected devices are then integrated into a peer-to-peer network, facilitating lateral movement and expanding the botnet. The botnet's command and control infrastructure is obfuscated using the Kademlia DHT protocol, making detection and disruption challenging. The compromised routers are utilized as proxies for malicious traffic, effectively exfiltrating data and enabling further cybercriminal activities. The impact includes the creation of a robust proxy network that supports various malicious operations, posing significant security risks to affected networks.
Kill Chain Progression
Initial Compromise
Description
Attackers exploit vulnerabilities in ASUS routers to gain unauthorized access.
Related CVEs
CVE-2023-39780
CVSS 8.8A command injection vulnerability in ASUS routers allows authenticated attackers to execute arbitrary system commands.
Affected Products:
ASUS RT-AX55 – < 3.0.0.4.386.50003
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Compromise Infrastructure: Botnet
Application Layer Protocol
Encrypted Channel: Symmetric Cryptography
Proxy: External Proxy
Masquerading: Match Legitimate Name or Location
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
User Execution: Malicious Link
Ingress Tool Transfer
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Change Control Processes
Control ID: 6.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity Management and Access Control
Control ID: Identity Pillar
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
KadNap botnet targeting ASUS routers creates critical infrastructure vulnerabilities, enabling malicious proxy networks that compromise network integrity and customer data protection.
Information Technology/IT
Botnet exploitation of edge networking devices exposes IT infrastructure to command-and-control operations, lateral movement, and encrypted traffic monitoring bypass capabilities.
Financial Services
Compromised router infrastructure enables credential stuffing and brute-force attacks against financial institutions, violating PCI compliance requirements and transaction security protocols.
Health Care / Life Sciences
Router-based proxy networks threaten HIPAA compliance through unencrypted traffic exposure and unauthorized data exfiltration paths in healthcare network communications.
Sources
- New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy networkhttps://www.bleepingcomputer.com/news/security/new-kadnap-botnet-hijacks-asus-routers-to-fuel-cybercrime-proxy-network/Verified
- KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnethttps://thehackernews.com/2026/03/kadnap-malware-infects-14000-edge.htmlVerified
- Silence of the hops: The KadNap botnethttps://malware.news/t/silence-of-the-hops-the-kadnap-botnet/104759Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to the KadNap botnet incident as it could likely limit the botnet's ability to exploit vulnerabilities, establish persistence, and propagate within the network, thereby reducing the overall impact and reach of the attack.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit router vulnerabilities would likely be constrained, reducing the chances of unauthorized access.
Control: Zero Trust Segmentation
Mitigation: The malware's ability to establish persistent tasks would likely be limited, reducing the risk of sustained unauthorized activities.
Control: East-West Traffic Security
Mitigation: The botnet's ability to propagate laterally would likely be constrained, reducing the spread within the network.
Control: Multicloud Visibility & Control
Mitigation: The botnet's command and control communications would likely be limited, reducing the effectiveness of obfuscation techniques.
Control: Egress Security & Policy Enforcement
Mitigation: The exfiltration of data through compromised routers would likely be constrained, reducing unauthorized data transfers.
The overall impact of the botnet's operations would likely be reduced, limiting the security risks posed by the proxy network.
Impact at a Glance
Affected Business Functions
- Network Security
- Internet Connectivity
- Remote Access Services
Estimated downtime: 7 days
Estimated loss: $50,000
Potential exposure of network configurations and user credentials stored on compromised routers.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict unauthorized lateral movement within the network.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound traffic, preventing data exfiltration.
- • Utilize Multicloud Visibility & Control to detect and respond to anomalous behaviors across cloud environments.
- • Apply Inline IPS (Suricata) to identify and block known exploit patterns and malicious payloads.
- • Ensure regular firmware updates and security patches for all network devices to mitigate known vulnerabilities.



