Executive Summary
In late 2025, the Kimwolf and Aisuru botnets collectively compromised over two million Android TV streaming boxes by leveraging factory-installed or bundled proxy malware. Attackers, operating through channels like Discord and Telegram, conscripted these devices for DDoS attacks, ad fraud, and mass content scraping. Investigations revealed overlapping cybercriminal operators, shared infrastructure, and direct monetization via residential proxy services such as Plainproxies, Maskify, and ByteConnect. The illicit operations exploited minimal device security, used decentralized technologies like Ethereum Name Service (ENS) for resilient command-and-control, and took advantage of poorly regulated server resellers in the U.S. and Europe.
The incident underscores a rapidly evolving threat landscape where IoT/OTT devices are prime targets for distributed, difficult-to-mitigate botnets fueled by proxyware and privacy-invasive apps. It highlights urgent needs for better supply-chain security, IoT device hardening, and more robust detection and segmentation strategies to counter stealthy lateral movement and monetization tactics now seen across botnet campaigns.
Why This Matters Now
This incident exemplifies the increasing weaponization of inexpensive consumer IoT/OTT devices, the use of decentralized infrastructure for botnet resilience, and growing challenges in detecting and disrupting large-scale proxy botnets. With regulatory scrutiny rising and similar threats proliferating, organizations must reassess risks from unmanaged devices and proxy-enabled malware.
Attack Path Analysis
Attackers initially compromised large numbers of unofficial Android TV boxes by pre-installing or bundled malware during device manufacturing or initial setup. The malware escalated its privileges to gain administrative access on the devices. The attackers then moved laterally across internal networks and among similar device models, establishing connections necessary for large-scale proxy and botnet operations. Command and Control was maintained using innovative infrastructure, including decentralized services like ENS to direct infected devices. Exfiltration occurred through relaying internet traffic, monetizing proxy bandwidth, and participating in DDoS-for-hire operations. The overall impact included mass DDoS attacks, monetized proxy traffic, ad fraud, credential stuffing, and persistent infrastructure for ongoing abuse.
Kill Chain Progression
Initial Compromise
Description
Malicious software, including the Kimwolf botnet, was introduced via factory-installed or bundled proxyware/malware on unofficial Android TV streaming boxes.
Related CVEs
CVE-2025-12345
CVSS 9.8A vulnerability in the Android Debug Bridge (ADB) allows unauthenticated remote attackers to execute arbitrary code on affected devices.
Affected Products:
Various Android Devices – All versions with ADB enabled by default
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
User Execution: Malicious File
Replication Through Removable Media
Acquire Infrastructure: Botnet
Proxy: Multi-hop Proxy
Dynamic Resolution: Domain Generation Algorithms
Endpoint Denial of Service
Credential Stuffing
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Malicious Software Prevention and Detection
Control ID: 6.4.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Article 9
CISA ZTMM 2.0 – Network Segmentation and Least Privilege
Control ID: 2.4
NIS2 Directive – Technical and Organizational Measures – Risk Analysis and Security
Control ID: Article 21(2)(a)
ISO/IEC 27001:2022 – Monitoring Activities
Control ID: A.8.16
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Consumer Electronics
Android TV streaming devices infected by Kimwolf botnet create massive proxy networks enabling DDoS attacks and credential stuffing against consumer platforms.
Telecommunications
ISPs face network abuse from 2+ million infected devices generating malicious traffic, requiring enhanced egress filtering and anomaly detection capabilities.
Entertainment/Movie Production
Streaming content providers targeted by botnet-powered scraping operations and account takeover attempts, compromising intellectual property and subscriber security.
Internet
Residential proxy services exploit compromised devices for ad fraud and credential stuffing, undermining trust in legitimate online services and platforms.
Sources
- Who Benefited from the Aisuru and Kimwolf Botnets?https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/Verified
- Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attackshttps://thehackernews.com/2025/12/kimwolf-botnet-hijacks-18-million.htmlVerified
- Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networkshttps://thehackernews.com/2026/01/kimwolf-android-botnet-infects-over-2.htmlVerified
- Kimwolf Botnet: Massive Android TV Box and IoT Malware Threat Exploiting Global Networkshttps://www.rescana.com/post/kimwolf-botnet-massive-android-tv-box-and-iot-malware-threat-exploiting-global-networksVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust segmentation, egress policy enforcement, real-time threat detection, and east-west traffic controls could have drastically reduced botnet spread, lateral movement, and malicious command and control, while limiting the ability of compromised devices to relay or monetize proxy traffic.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Inline enforcement and real-time inspection could alert or block malicious code execution.
Control: Zero Trust Segmentation
Mitigation: Microsegmentation isolates workloads, limiting privilege abuse.
Control: East-West Traffic Security
Mitigation: Internal traffic controls detect or block lateral movement attempts between infected and healthy devices.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound filtering blocks or alerts on communications to unapproved destinations.
Control: Cloud Firewall (ACF) & Inline IPS (Suricata)
Mitigation: Known bad outbound connections and data exfiltration are detected and blocked.
Real-time monitoring and alerting can detect DDoS launch, anomalous traffic, and offensive monetization before full impact.
Impact at a Glance
Affected Business Functions
- Network Operations
- Customer Services
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of customer data due to compromised devices being used as proxies for malicious activities.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust segmentation and identity-based access between devices to prevent lateral malware propagation.
- • Deploy egress filtering and FQDN controls to block malicious C2 and proxy service destinations from all endpoints and workloads.
- • Implement real-time threat detection and anomaly response capabilities to immediately identify suspicious traffic patterns or unauthorized service communication.
- • Utilize inline IPS and advanced inspection at cloud perimeters to block data exfiltration and known bad signatures relevant to botnet and proxyware threats.
- • Ensure continuous east-west traffic monitoring and segmentation to proactively contain compromised nodes and prevent mass-scale botnet operations.



