Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Diablo 4. Lord of Hatred gives us first Korn song in 4 years

    April 27, 2026

    Gerry Conway, Marvel and DC Writer, Dies at 73

    April 27, 2026

    Quickest EV In The World

    April 27, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»14,000 routers are infected by malware that’s highly resistant to takedowns
    14,000 routers are infected by malware that’s highly resistant to takedowns
    Tech Reviews

    14,000 routers are infected by malware that’s highly resistant to takedowns

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 12, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices—primarily made by Asus—that have been conscripted into a proxy network that anonymously carries traffic used for cybercrime.

    The malware—dubbed KadNap—takes hold by exploiting vulnerabilities that have gone unpatched by their owners, Chris Formosa, a researcher at security firm Lumen’s Black Lotus Labs, told Ars. The high concentration of Asus routers is likely due to botnet operators acquiring a reliable exploit for vulnerabilities affecting those models. He said it’s unlikely that the attackers are using any zero-days in the operation.

    Table of Contents

    Toggle
    • A botnet that stands out among others
      • Related posts:
    • LG announces new line of xboom speakers ahead of CES
    • Today's NYT Mini Crossword Answers for Jan. 5
    • 2025 UniFi Holiday Sale: Top Ubiquiti at Friendly Costs

    A botnet that stands out among others

    The number of infected routers averages about 14,000 per day, up from 10,000 last August, when Black Lotus discovered the botnet. Compromised devices are overwhelmingly located in the US, with smaller populations in Taiwan, Hong Kong, and Russia. One of the most salient features of KadNap is a sophisticated peer-to-peer design based on Kademlia, a network structure that uses distributed hash tables to conceal the IP addresses of command-and-control servers. The design makes the botnet resistant to detection and takedowns through traditional methods.

    “The KadNap botnet stands out among others that support anonymous proxies in its use of a peer-to-peer network for decentralized control,” Formosa and fellow Black Lotus researcher Steve Rudd wrote Wednesday. “Their intention is clear: avoid detection and make it difficult for defenders to protect against.”

    Distributed hash tables have long been used to create hardened peer-to-peer networks, most notably BitTorrent and the Inter-Planetary File System. Rather than having one or more centralized servers that directly control nodes and provide them with the IP addresses of other nodes, DHTs allow any node to poll other nodes for the device or server it’s looking for. The decentralized structure and the substitution of IP addresses with hashes give the network resilience against takedowns or denial of service attacks.

    Related posts:

    Elon Musk misled investors during his Twitter takeover, jury finds

    'I thought this video was an April Fool's joke, but it's still March': Nvidia reveals DLSS 5 to supe...

    From prophet to product: How AI came back down to earth in 2025

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCanceled Xbox 360 Star Wars Battlefront 3 Prequel Revived By Fans
    Next Article Run a Real Time Speech to Speech AI Model Locally
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    James Gunn cautiously reveals that 2 beleaguered DC comic book shows are still ‘in development’ — but the DCU’s biggest movie gamble has been shelved

    April 27, 2026
    Tech Reviews

    Forced Windows updates can now be paused forever

    April 27, 2026
    Tech Reviews

    Today’s NYT Mini Crossword Answers for April 27

    April 27, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025139 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202523 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202514 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025139 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202523 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202514 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.