bug-bounty529
xss295
rce173
google160
facebook137
exploit133
malware131
microsoft121
account-takeover121
bragging-post119
privilege-escalation108
authentication-bypass94
open-source93
cve93
csrf89
access-control77
stored-xss75
phishing73
web-security66
ai-agents66
reflected-xss63
writeup57
apple57
input-validation52
browser52
information-disclosure51
ssrf51
reverse-engineering50
sql-injection50
smart-contract49
defi48
cross-site-scripting48
privacy47
tool47
ethereum46
ai-security45
api-security44
supply-chain43
ctf41
vulnerability-disclosure40
lfi40
dos39
web339
remote-code-execution38
llm38
opinion37
burp-suite37
race-condition37
web-application37
credential-theft36
0
4/10
KadNap, a takedown-resistant botnet infecting ~14,000 routers (primarily Asus models), uses a Kademlia-based peer-to-peer architecture with distributed hash tables for command-and-control evasion. The compromised devices are conscripted into the Doppelganger proxy service to anonymously tunnel cybercriminal traffic.
botnet
router-malware
asus
peer-to-peer
kademlia
dht
command-and-control
proxy-network
unpatched-vulnerabilities
cybercrime-infrastructure
takedown-resistant
black-lotus-labs
doppelganger
distributed-hash-tables
KadNap
Black Lotus Labs
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
Lumen
BitTorrent
IPFS