Get all your news in one place.
100’s of premium titles.
One app.
Start reading
The Independent UK
The Independent UK
Anthony Cuthbertson

Criminals hijack thousands of devices to create never-before-seen cyber weapon

Criminals have secretly hijacked more than 14,000 devices worldwide in order to carry out attacks that are almost impossible to protect against, security researchers have warned.

The majority of devices infected by the sophisticated new malware, dubbed ‘KadNap’, are Asus routers, which are being used to route malicious traffic to carry out large-scale cyberattacks.

Details of the KadNap botnet were shared by the cybersecurity firm Lumen in a new report, which revealed that it is using a decentralised peer-to-peer system to avoid network detection.

A botnet is created by compromising the security of internet-connected devices, which can range from routers to smart fridges.

These devices are then covertly hijacked and linked together to carry out distributed-denial-of-service (DDoS) attacks, which overwhelm websites and online services with traffic to knock them offline.

“As modern society increasingly relies on internet-exposed Internet of Things (IoT) devices, the opportunities for malicious actors to exploit vulnerabilities continue to abound,” Lumen’s report stated.

“Threat actors are building large-scale botnets specifically designed to hijack devices in this growing pool of targets, using them to route traffic and evade detection by network security systems.”

The majority of KadNap victims are located in the US, though security researchers have identified infected devices in the UK, Australia, Brazil, Russia, and across Europe.

For the average owner of an Asus router infected with KadNap, the malware would be undetectable beyond internet speeds feeling slightly sluggish at times.

Its decentralised design means there is no central server that could be easily shut down by law enforcement, making the KadNap botnet incredibly resilient to attempts to dismantle it.

A map showing the location of KadNap victims (Lumen)

Using traffic from household routers means the attackers can bypass conventional security filters, as it looks like the traffic is coming from the average person browsing the web.

“Their intention is clear: avoid detection and make it difficult for defenders to protect against,” Lumen’s report concludes.

“KadNap’s bots are sold through Doppelganger, a service whose users leverage these hijacked devices for a range of malicious purposes, including brute-force attacks and highly targeted exploitation campaigns.

“As a result, every IP address associated with this botnet represents a significant, persistent risk to organisations and individuals alike.”

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.