• Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights
  • Technologies
    • Networking
    • Cybersecurity
    • Collaboration
    • Edge Cloud
    • Managed & Professional Services
    • SASE
  • Customer Stories
  • Insights
    • Business Continuity & Disaster Recovery (BCDR)
    • Customer Experience
    • Data-Driven Business
    • Operational Efficiency
    • Tech Trends
  • Industries
    • Financial Services
    • Gaming
    • Healthcare
    • Manufacturing
    • Media & Entertainment
    • Public Sector
    • Higher Education
    • Retail
    • Technology
  • About Lumen
    • Black Lotus Labs
    • Leadership Perspectives
    • Newsroom
    • News Spotlights

Silence of the hops: The KadNap botnet

Black Lotus Labs Posted On March 10, 2026
0
212 Views


0
Shares
  • Share On Facebook
  • Tweet It

Illustrated scene of two people seated back-to-back at separate desks in a dim, cluttered room, each working on a computer while using a telephone handset, illustrating innocent victims being used by the Doppelganger proxy service.

The Black Lotus Labs team at Lumen has discovered a sophisticated new malware named “KadNap.” This threat primarily targets Asus routers, conscripting them into a botnet that proxies malicious traffic. Since August 2025, we have been monitoring the growth of this network, which is now above 14,000 infected devices.

KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to conceal the IP address of their infrastructure within a peer-to-peer system to evade traditional network monitoring. Infected devices use the DHT protocol to locate and connect with a command-and-control (C2) server, while defenders cannot easily find and add those C2s to threat lists. In short, the innovative use of the DHT protocol allows the malware to establish robust communication channels that are difficult to disrupt by hiding in the noise of legitimate peer-to-peer traffic.

Once added to the network, bots are then marketed by a proxy service called “Doppelganger,” which is specifically tailored for criminal activity and appears to be a rebrand of the Faceless service, which was powered by victims of TheMoon malware.

Using the expansive Lumen global backbone to observe KadNap’s infrastructure, we found that more than 60% of KadNap’s victims are based in the United States. While Asus routers are the primary targets, the operators are using the malware effectively against a variety of edge networking devices and set aside a number of C2s used to silo their infrastructure by victim type.

As of this publication, Lumen has proactively blocked all network traffic to or from the control infrastructure. Given the obfuscation of C2 servers inherent to this protocol, Black Lotus Labs will share the indicators of compromise (IoCs) and will begin distributing the indicators of compromise (IoCs) into public feeds to enable others to help disrupt this threat.

Lumen Technologies would like to thank our partners at Spur for their contributions to our efforts to track and mitigate this threat.

Introduction and Understanding Kademlia

As modern society increasingly relies on internet-exposed Internet of Things (IoT) devices, the opportunities for malicious actors to exploit vulnerabilities continue to abound. Threat actors are building large-scale botnets specifically designed to hijack devices in this growing pool of targets, using them to route traffic and evade detection by network security systems.

Large residential proxy services offer millions of infected devices used by both legitimate users and malicious actors. In contrast, smaller botnets such as REMPROXY or Quad7 are exclusively operated by and marketed to criminal actors for more focused attacks, posing a significant threat whenever their IPs are active. To monitor the proliferation of both small and large botnets across the landscape, Lumen has created multiple algorithms to search for new and emerging networks as they appear.

In early August of 2025, our algorithm detected over 10,000 Asus devices that were all communicating with a particular set of servers. Our investigation into these C2s uncovered a malicious file which was used to download a shell script from a server at 212.104.141[.]140, in a file called aic.sh. This file sets the stage for the KadNap malware and initiates the process of incorporating the victim into the P2P network.

Screenshot of a shell script in a dark terminal editor that checks for a marker string in /jffs/.asusrouter, conditionally creates or updates the file with shell commands, downloads a script via wget, sets execute permissions, and runs it.

Figure 1: aic.sh script initializing a cron job to run every hour.

The file sets up a cron job to pull the malicious shell script from the server at the 55-minute mark of every hour, rename it to .asusrouter and then run it from /jffs/.asusrouter location. After the persistence was initialized, it would then pull down a malicious ELF file for the Asus routers, rename it to kad, and then execute it:

Screenshot of a shell script in a dark-themed editor that repeatedly checks whether a process named kad is running, and if not, deletes any existing file, downloads an executable via wget, sets execute permissions, runs it and pauses briefly before retrying.

Figure 2: aic.sh shell scripts download malicious ELF file and renames it to Kad.

Kademlia

Kademlia is an implementation of a distributed hash table (DHT) that allows for efficient decentralized lookups of information across peers and has been proven through multiple real-world protocols such as BitTorrent DHT, eMule, I2P and Etherum.

To better understand this system, think of Kademlia like using a chain of friends to find someone’s phone number: each friend does not know the whole number but knows someone who can get you closer to the answer. Passing your request along this chain, you quickly put together the whole phone number. Likewise, Kademlia nodes forward queries to others that are “closer” to the target, enabling fast and efficient searches without knowing the whole network.

The KadNap malware is a custom implementation of a Kademlia DHT. Naming the ELF file kad was likely in relation to using this protocol to hide the IP address of the C2 server.

Malware Analysis

Once the ELF file from the malware server is loaded, it begins the process of installing KadNap. In addition to creating a “phone tree” for finding the hidden C2 addresses, the malware was designed with some versatility—Black Lotus Labs identified samples of KadNap for both ARM and MIPS processors. Each sample begins initialization by forking, setting STDIN, STDOUT and STDERR to /dev/null, determining the external IP address, and storing into an initialized struct.

Screenshot of KadNap malware initialization code in a dark-themed editor showing a main() function with socket and network-related calls such as socketWrapper, connectWrapper, error handling logic and variables like external_ip, fd_outname, and errno.

Figure 3: KadNap malware initializations.

Next it will cycle through a list of NTP servers until it makes a connection, retrieves the current time and stores it along with the host uptime. These values are used later in the network communications to create a hash used to “phone friends” and find other peers in the network.

Screenshot of decompiled C-style code in a dark-themed editor listing hardcoded NTP server strings, including time-a.nist.gov, time-b.nist.gov, time.windows.com, ntp.asql.co.uk, and chronos.csr.net, along with associated character array and integer definitions.

Figure 4: KadNap trying multiple different NTP servers for added resilience in the effect one is not active or reachable.

From here, the malware has enough information to move into the Kademlia DHT implementation.

Find Peers Thread

After the time synchronization it will fork, creating a child process that connects to the BitTorrent network using known bootstrap nodes and generates a custom DHT packet to search for other infected nodes from which to receive commands. The child process then creates a custom infohash by filing the “name” field of the bencoded string with an XOR key computed from contacting a NTP server and the computers uptime. It then SHA-1 hashes the 0x40 bytes hardcoded string 6YL5aNSQv9hLJ42aDKqmnArjES4jxRbfPTnZDdBdpRhJkHJdxqMQmeyCrkg2CBQg with the XOR key, and stores that value in the “pieces” field of the bencoded string.

Screenshot of decompiled C-style code in a dark-themed editor showing memory operations, bitwise character manipulation, hex encoding and SHA‑1 hashing logic, including functions like memcpy, hex_encode, sha1_init, sha1Wrapper, and assignment of a derived key from a hashed string.

Figure 5: KadNap “find_peers” implementation of the Kademlia DHT protocol. Creates a custom hash and then stores that value.

It then SHA-1 hashes the full bencoded string and uses that as the info hash to find other peers, then sends this through a pipe to be read by another thread.

Contact Peers Thread

Another thread is created immediately to read six bytes from the pipe that are the IP and port of a peer on the network. It will connect to the peer and receive a buffer 0x1000 bytes in size and uses a hardcoded key to decrypt it. It then SHA-1 hashes the decrypted payload and uses the hash as the key to encrypt/decrypt follow on traffic.

Screenshot of decompiled C-style code in a dark-themed editor showing AES encryption setup and network data handling, including an aes_setkey_enc call, receiving data via recvfrom, and encrypting received data into an output buffer using an AES keystream.

Figure 6: Kad functionality to connect to peer using the DHT protocol.

It then parses the payload, which is SHA-1 hashed again. This hash is used as the key to AES encrypt/decrypt follow on traffic.

Upon reaching the final peer, if the initial handshake succeeds, the malware will receive an additional payload that is decrypted and saved as a file. The path and filename are sent to a second pipe, to be read from another thread. Two files were received after contact with the final peer the malware was searching for. One was named fwr.sh (likely a firewall rule) which also closed port 22 on the infected device.

Screenshot of an fwr.sh file download from final peer showing an iptables command that inserts a firewall rule to drop incoming TCP traffic on port 22, blocking SSH access.

Figure 7: fwr.sh file download from final peer.

The other was named .sose and placed in the /tmp directory.

Hex dump displayed in a dark-themed interface showing rows of hexadecimal byte values alongside their ASCII representation, with offsets on the left and mixed readable and non‑printable characters highlighted in color.

Figure 8: .sose file downloaded from final peer.

Malicious Thread

The parent thread continues after starting the previous two threads and goes into a loop that calls two main functions. The first function readCommandFromPipe2AndExecute reads a filename sent on the pipe and executes it.

Screenshot of decompiled C-style code in a dark-themed editor showing an infinite while (true) loop with conditional checks, pipe-based command execution, error handling and periodic sleeping via nanosleepWrapper, including logic that reads commands, executes a shell script and evaluates return codes.

Figure 9: Malicious thread to connect to Kad C2 to join the botnet.

The above function, labeled tmpSose, will check for the presence of the file /tmp/.sose and if it exists, it will read ten bytes from the file. /tmp/.sose contains a list of C2 IP:port as well as some other config information. The sample will then fork and attempt to reach out to the C2s.

Kademlia Weak Custom Implementation

In a true Kademlia peer-to-peer network, the final peer changes over time, reflecting its decentralized nature. However, in analyzing our KadNap samples dating back to August 2025, we consistently found the same two final hop nodes before reaching the C2 servers. This indicates the attackers maintain persistent nodes to retain control over the network. Those two longstanding nodes were 45.135.180[.]38 and 45.135.180[.]177

Screenshot of network packet capture logs showing repeated TCP connections where infected devices consistently contact one of two specific intermediary nodes before establishing a connection to command-and-control infrastructure.

Figure 10: Prior to connecting to a C2, victims always contact one of two final nodes directly before becoming operational.

Global Telemetry Analysis

Black Lotus Labs has monitored this network since August of 2025, as it had grown to maintain a daily average of 14,000 distinct victims, while using three to four active C2s on average. The botnet struggled to maintain a consistent victim pool in the initial stages; however, as shown in the chart below, its operators have maintained a consistent size in the last few months.

Line chart titled KadNap Victims Over Time showing total infected devices by date from September 2025 to February 2026, with an early decline, a sharp increase in early December and a sustained higher plateau thereafter.

Figure 11: KadNap victims over time.

The victims are distributed across several countries, with 60% located in the United States and 5% each in Taiwan, Hong Kong and Russia.

World map titled KadNap Victim Locations with countries shaded by infection density, showing the highest concentration of victims in the United States and additional activity across Europe, Asia, Australia and parts of South America.

Figure 12: KadNap victim locations.

Our analysis and telemetry indicate that not all infected devices communicate with every C2 server. This suggests the threat actor is segmenting their infrastructure based on device types and models. More than half of the botnet (all the Asus victims) connects to two Asus C2 servers, while the rest communicate with one of two other active C2s.

KadNap’s purpose was unclear when first discovered. However, through our partnership with Spur, they were able to tie the C2 servers we discovered as entry points for a known malicious proxy service. Based on the botnet’s structure, Black Lotus Labs confidently agrees with Spur that this is likely a new botnet linked to the now defunct Faceless proxy service, which previously used TheMoon malware.

Promotional graphic for a residential proxy service titled “Anonymous resident proxies and private solutions” highlighting features for complete anonymity, residential IP addresses and global coverage across multiple countries.

Figure 13: Proxy service Doppelganger currently selling access to the KadNap botnet.

Conclusion

The KadNap botnet stands out among others that support anonymous proxies in its use of a peer-to-peer network for decentralized control. Their intention is clear: avoid detection and make it difficult for defenders to protect against. KadNap’s bots are sold through Doppelganger, a service whose users leverage these hijacked devices for a range of malicious purposes, including brute-force attacks and highly targeted exploitation campaigns. As a result, every IP address associated with this botnet represents a significant, persistent risk to organizations and individuals alike.

Black Lotus Labs will continue to find, monitor and track malicious botnets to help secure the internet. With KadNap, Lumen DefenderSM customers have been protected from this network since August 2025. We will share indicators of compromise (IoCs) in public feeds to support global defenders and disrupt this threat.

We encourage the community to monitor and alert on these and any similar IoCs. We also advise the following actions.

Corporate Network Defenders

  • Continue to look for attacks on weak credentials and suspicious login attempts, even when they originate from residential IP addresses which bypass geofencing and ASN-based blocking
  • Protect cloud assets from communicating with bots that attempt to perform password spraying attacks and begin blocking IoCs with Web Application Firewalls
  • Check for devices reaching out to public BitTorrent trackers and exhibiting connectivity to any known peers within the KadNap network

Consumers with SOHO routers

  • Users should follow best practices for regularly rebooting routers and installing security updates and patches. For guidance on how to perform these actions, please see the best practices document prepared by Canadian Centre for Cybersecurity.
  • Organizations that manage SOHO routers: make sure devices do not rely upon common default passwords. They should also ensure that the management interfaces are properly secured and not accessible via the internet. For more information on securing management interfaces, please see DHS’ CISA BoD 23-02 on securing networking equipment.
  • Check for devices reaching out to public BitTorrent trackers or exhibiting connectivity to any known peers within the KadNap network.
  • We also recommend replacing devices once they reach their manufacturer end of life and are no longer supported.

Analysis of KadNap was performed by Chris Formosa and Steve Rudd with technical editing by Ryan English.

Current IOCs will be found on our GitHub page and continuously updated there. We encourage the community to monitor and alert on these and any similar IoCs.

If you would like to collaborate on similar research, please contact us on LinkedIn or X @BlackLotusLabs.

 

This information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. This content is provided for informational purposes only and may require additional research and substantiation by the end user. In addition, the information is provided “as is” without any warranty or condition of any kind, either express or implied. Use of this information is at the end user’s own risk. Lumen does not warrant that the information will meet the end user’s requirements or that the implementation or usage of this information will result in the desired outcome of the end user. All third-party company and product or service names referenced in this article are for identification purposes only and do not imply endorsement or affiliation with Lumen. This document represents Lumen products and offerings as of the date of issue. Services not available everywhere. Lumen may change or cancel products and services or substitute similar products and services at its sole discretion without notice. © 2026 Lumen Technologies. All Rights Reserved.

Post Views: 212

No related posts.

0
Shares
  • Share On Facebook
  • Tweet It


BotnetLeadership PerspectivesMalware


Author

Black Lotus Labs

The mission of Black Lotus Labs is to leverage our network visibility to help protect customers and keep the internet clean.

Trending Now
How Huitt-Zollars built a future-ready digital foundation with Lumen
Lumen Customer Stories Team February 20, 2026
Silence of the hops: The KadNap botnet
Black Lotus Labs March 10, 2026
You may also like
Announcing Lumen Defender℠ AMDR with Microsoft Sentinel: Advanced Managed Detection & Response Powered by Black Lotus Labs®
November 19, 2025
SystemBC: Bringing the noise
September 18, 2025
One sock fits all: The use and abuse of the NSOCKS botnet
November 19, 2024
  • Categories

    Adaptive Networking

    Connected Security

    Hybrid Cloud

    Communications and Collaboration

    Edge Computing

    SASE


  • Lumen is unleashing the world’s digital potential. We ignite business growth by connecting people, data, and applications – quickly, securely, and effortlessly. As the trusted network for AI, Lumen uses the scale of our network to help companies realize AI’s full potential. From metro connectivity to long-haul data transport to our edge cloud, security, managed service, and digital platform capabilities, we meet our customers’ needs today and as they build for tomorrow.

Services not available everywhere. ©2025 Lumen Technologies. All Rights Reserved.
Press enter/return to begin your search