2026 Futuriom 50: Highlights →Explore

Executive Summary

In late 2025, security researchers at Lumen’s Black Lotus Labs null-routed traffic to over 550 command-and-control (C2) servers associated with the rapidly expanding Kimwolf and AISURU botnets. These botnets primarily targeted Android TV streaming devices—especially those with exposed ADB services—and used a malicious SDK (ByteConnect) to conscript over two million devices into a powerful residential proxy network. Threat actors leveraged this massive bot army to launch distributed denial-of-service (DDoS) attacks and facilitate malicious relay of internet traffic, further monetizing access via underground proxy services marketed on Discord and other platforms. The botnets exhibited rapid growth, exploiting security flaws in both consumer hardware and third-party proxy services for propagation.

This incident highlights a shift in cybercriminal tactics toward wielding residential IP addresses for nefarious activity, circumventing traditional detection and blocking mechanisms. The scale and sophistication of these campaigns underscore escalating risks to organizations relying on residential endpoints and underscore the urgency for improved segmentation, anomaly detection, and real-time response.

Why This Matters Now

Botnet operators are increasingly abusing everyday consumer hardware to establish hard-to-detect proxy networks leveraged for DDoS attacks and cybercrime. The Kimwolf/AISURU threat demonstrates attackers’ ability to rapidly adapt, monetize, and scale, emphasizing the urgent need for modern controls and visibility across residential and BYOD environments.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The incident revealed weak internal segmentation, lack of east-west visibility, and insufficient controls over consumer and BYOD devices, undermining ability to detect lateral movement and malicious traffic.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Application of Zero Trust segmentation, east-west visibility, egress policy, and threat detection controls could have significantly limited the ability of the botnet to spread, communicate with external C2, and monetize compromised assets within a cloud or hybrid network. CNSF-aligned controls provide microsegmentation, egress constraint, and anomaly detection that reduce blast radius and disrupt malicious operations.

Initial Compromise

Control: Zero Trust Segmentation

Mitigation: Prevents unauthorized access to endpoints and workloads.

Privilege Escalation

Control: Multicloud Visibility & Control

Mitigation: Enables detection of abnormal privilege or configuration changes.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Blocks lateral movement and scans between workloads or segments.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Detects and blocks unauthorized outbound connections to proxy and C2 domains.

Exfiltration

Control: Threat Detection & Anomaly Response

Mitigation: Detects data and network exfiltration behaviors through analytics and alerts.

Impact (Mitigations)

Limits blast radius and denies attack infrastructure the ability to launch disruptions.

Impact at a Glance

Affected Business Functions

  • Network Operations
  • Customer Services
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Potential exposure of sensitive customer data due to compromised devices being used as proxies for malicious activities.

Recommended Actions

  • Implement Zero Trust microsegmentation to prevent unauthorized access to endpoints and limit lateral propagation opportunities.
  • Deploy egress security controls and FQDN filtering to block outbound C2 and data exfiltration attempts from compromised workloads.
  • Enhance visibility with centralized multicloud observability and automated anomaly detection to identify infection and abuse early.
  • Enforce east-west traffic policies that restrict workload-to-workload communication based on identity and least privilege principles.
  • Regularly review and update policy enforcement and runtime inspection coverage across hybrid and cloud environments.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image