A Botnet That Refuses to Die
Security researchers at Lumen's Black Lotus Labs have uncovered a sophisticated botnet that has quietly enslaved roughly 14,000 routers and network devices — predominantly Asus consumer models — into a proxy network serving cybercriminal operations. The malware, which the researchers have named KadNap, distinguishes itself from the vast majority of botnets through a peer-to-peer architecture that makes it extraordinarily difficult to take down.
The infection count has grown from approximately 10,000 devices when Black Lotus first discovered the botnet last August to 14,000 as of early March. The overwhelming majority of compromised devices are located in the United States, with smaller clusters in Taiwan, Hong Kong, and Russia. The high concentration of Asus routers among the victims suggests the botnet operators have acquired a reliable exploit targeting vulnerabilities in specific Asus firmware versions.
How KadNap Spreads and Persists
According to Black Lotus researcher Chris Formosa, KadNap gains its initial foothold by exploiting known but unpatched vulnerabilities in consumer-grade routers. These are not zero-day exploits requiring specialized skills — they are publicly documented security flaws that manufacturers have issued patches for, but that device owners have never applied. The gap between patch availability and patch installation remains one of the most persistent problems in cybersecurity, and botnets like KadNap ruthlessly exploit it.
Once installed on a router, KadNap transforms the device into a node in a distributed proxy network. Traffic from cybercriminal operations — fraud, credential stuffing, web scraping, and other malicious activities — is routed through the compromised routers, making it appear to originate from legitimate residential IP addresses. This residential proxy service is then sold to other criminals, providing the botnet operators with a steady revenue stream.
What makes KadNap particularly dangerous is its use of a peer-to-peer communication protocol based on Kademlia, a well-known distributed hash table algorithm originally developed for legitimate file-sharing applications. In a traditional botnet, compromised devices receive instructions from a central command-and-control server. Law enforcement and security teams can disrupt these botnets by identifying and seizing the command server, effectively cutting off the head of the snake.





