{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/66cf6d924960e4eb18d4aa8d/69b33c8b5668adfee6458a60?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"14,000 ASUS Routers Infected: KadNap Botnet Creates Nearly Untouchable Malware Network","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/66cf6d924960e4eb18d4aa8d/1773354079072-9907b7f0-081d-44c3-8e6b-020315fb34da.jpeg?height=200","description":"<p>A new malware campaign has compromised more than <strong>14,000 ASUS routers</strong>, creating a resilient botnet that security researchers say is unusually difficult to dismantle.</p><p><br></p><p>In this episode of <strong>IT SPARC Cast – CVE of the Week</strong>, John Barger and Lou Schmidt examine the <strong>KadNap router malware</strong>, which targets unpatched ASUS routers and installs a persistent backdoor designed to survive typical remediation efforts.</p><p><br></p><p>The malware was identified by researchers at <strong>Lumen’s Black Lotus Labs</strong>, who discovered that infected routers are being used as part of a botnet capable of proxying internet traffic and enabling other malicious activities.</p><p><br></p><p>Unlike many botnets that rely on centralized command servers, KadNap uses <strong>peer-to-peer control mechanisms similar to BitTorrent</strong>, making it significantly harder for security teams to disrupt.</p><p><br></p><p>⸻</p><p><br></p><p>🔎<strong> What the KadNap Router Malware Does</strong></p><p><br></p><p>The malware exploits vulnerabilities in <strong>ASUS routers that have not been patched or configured securely</strong>.</p><p><br></p><p>Once installed, KadNap:</p><p>\t•\tCreates a <strong>persistent backdoor</strong> on the router</p><p>\t•\tSurvives <strong>reboots and firmware updates</strong></p><p>\t•\tEnables remote control of the router</p><p>\t•\tConnects the device to a <strong>distributed botnet network</strong></p><p>\t•\tRoutes malicious traffic through compromised residential internet connections</p><p><br></p><p>Researchers also discovered the infected routers are being used by a <strong>fee-based proxy service called Doppelganger</strong>, allowing customers to route their internet traffic through unsuspecting victims’ home networks.</p><p><br></p><p>⸻</p><p><br></p><p><strong>⚠ Why This Is Dangerous</strong></p><p><br></p><p>Because the traffic originates from compromised home routers, victims could unknowingly appear responsible for malicious activity such as:</p><p>\t•\tNetwork attacks</p><p>\t•\tSurveillance operations</p><p>\t•\tIllegal browsing activity</p><p>\t•\tStaging points for additional cyber intrusions</p><p><br></p><p>This makes detection and attribution far more difficult.</p><p><br></p><p>⸻</p><p><br></p><p>🏢<strong> Enterprise IT Risk</strong></p><p><br></p><p>This vulnerability is not limited to home users.</p><p><br></p><p>ASUS also produces <strong>small-business routers</strong>, meaning organizations or small offices using these devices could be exposed.</p><p><br></p><p>IT professionals should also remember that compromised routers can provide attackers with a <strong>network foothold for lateral movement</strong>, especially if IoT or remote-user networks are poorly segmented.</p><p><br></p><p>⸻</p><p><br></p><p>🛠<strong> How to Detect and Remove KadNap</strong></p><p><br></p><p>Security experts recommend checking routers for signs of compromise:</p><p><br></p><p>Look for:</p><p>\t•\t<strong>SSH enabled unexpectedly</strong></p><p>\t•\t<strong>Remote administration enabled</strong></p><p>\t•\tUnknown certificates or scheduled tasks</p><p>\t•\tSuspicious entries in device logs</p><p><br></p><p>Because the malware attaches to configuration files, simply rebooting or restoring a configuration backup <strong>will not remove it</strong>.</p><p><br></p><p>The proper remediation process:</p><p>\t1.\tPerform a <strong>full factory reset</strong></p><p>\t2.\tUpdate the router firmware immediately</p><p>\t3.\t<strong>Manually reconfigure the router</strong> (do not restore backups)</p><p><br></p><p>Experts also recommend <strong>changing default internal network ranges</strong>, such as moving away from the common 192.168.1.x subnet.</p><p><br></p><p>⸻</p><p><br></p><p>🔗<strong> Source Article</strong></p><p><br></p><p>https://arstechnica.com/security/2026/03/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</p><p><br></p><p>⸻</p><p><br></p><p>🔗<strong> Connect With Us</strong></p><p><br></p><p><strong>IT SPARC Cast</strong></p><p>@ITSPARCCast on X</p><p>https://www.linkedin.com/company/sparc-sales/ on LinkedIn</p><p><br></p><p><strong>John Barger</strong></p><p>@john_Video on X</p><p>https://www.linkedin.com/in/johnbarger/ on LinkedIn</p><p><br></p><p><strong>Lou Schmidt</strong></p><p>@loudoggeek on X</p><p>https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn</p>","author_name":"John Barger"}