bug-bounty529
xss295
rce173
google159
facebook134
exploit132
malware131
account-takeover121
bragging-post119
microsoft118
privilege-escalation108
authentication-bypass94
open-source93
cve93
csrf89
access-control77
stored-xss75
phishing73
web-security66
ai-agents66
reflected-xss63
writeup57
apple54
input-validation52
browser52
ssrf51
information-disclosure51
sql-injection50
reverse-engineering50
smart-contract49
privacy48
defi48
cross-site-scripting48
tool47
ethereum46
ai-security45
api-security44
supply-chain43
ctf41
lfi40
vulnerability-disclosure40
dos39
llm38
remote-code-execution38
web338
web-application37
burp-suite37
race-condition37
opinion37
credential-theft36
0
5/10
Researchers discovered KadNap, a botnet of 14,000+ Asus routers using Kademlia-based peer-to-peer distributed hash tables for decentralized command-and-control, making it highly resistant to traditional takedown methods while serving as infrastructure for the Doppelganger anonymous proxy service.
botnet
router-malware
peer-to-peer
kadmelia-dht
command-and-control
asus
takedown-resistant
doppelganger-proxy
distributed-hash-tables
anonymity-network
firmware-vulnerability
unpatched-vulnerability
KadNap
Black Lotus Labs
Lumen
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
BitTorrent
IPFS
0
4/10
KadNap, a takedown-resistant botnet infecting ~14,000 routers (primarily Asus models), uses a Kademlia-based peer-to-peer architecture with distributed hash tables for command-and-control evasion. The compromised devices are conscripted into the Doppelganger proxy service to anonymously tunnel cybercriminal traffic.
botnet
router-malware
asus
peer-to-peer
kademlia
dht
command-and-control
proxy-network
unpatched-vulnerabilities
cybercrime-infrastructure
takedown-resistant
black-lotus-labs
doppelganger
distributed-hash-tables
KadNap
Black Lotus Labs
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
Lumen
BitTorrent
IPFS