bug-bounty499
xss278
bragging-post117
rce117
account-takeover103
open-source91
google88
csrf85
authentication-bypass79
exploit75
stored-xss74
facebook72
web-security64
reflected-xss63
access-control63
privilege-escalation63
ai-agents63
microsoft58
input-validation51
writeup49
defi48
ssrf47
smart-contract47
cross-site-scripting47
sql-injection47
tool46
ethereum44
privacy43
information-disclosure42
cve41
api-security38
web-application37
llm37
burp-suite36
opinion35
automation35
web334
vulnerability-disclosure33
html-injection33
smart-contract-vulnerability33
responsible-disclosure32
machine-learning32
browser31
waf-bypass31
infrastructure31
denial-of-service30
code-generation30
oauth29
authentication29
apple29
0
4/10
KadNap, a takedown-resistant botnet infecting ~14,000 routers (primarily Asus models), uses a Kademlia-based peer-to-peer architecture with distributed hash tables for command-and-control evasion. The compromised devices are conscripted into the Doppelganger proxy service to anonymously tunnel cybercriminal traffic.
botnet
router-malware
asus
peer-to-peer
kademlia
dht
command-and-control
proxy-network
unpatched-vulnerabilities
cybercrime-infrastructure
takedown-resistant
black-lotus-labs
doppelganger
distributed-hash-tables
KadNap
Black Lotus Labs
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
Lumen
BitTorrent
IPFS