Kimwolf Botnet Targets Corporate and Government Networks
- A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to...
- kimwolf grew rapidly in the waning months of 2025 by tricking various "residential proxy" services into relaying malicious commands to devices on the local networks of those proxy...
- The malware that turns one's Internet connection into a proxy node is often quietly bundled with various mobile apps and games, and it typically forces the infected device...
A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distributed denial-of-service (DDoS) attacks and to relay other malicious and abusive Internet traffic. Kimwolf’s ability to scan the local networks of compromised systems for other IoT devices to infect makes it a sobering threat to organizations, and new research reveals Kimwolf is surprisingly prevalent in government and corporate networks.
Image: Shutterstock, @Elzicon.
kimwolf grew rapidly in the waning months of 2025 by tricking various “residential proxy” services into relaying malicious commands to devices on the local networks of those proxy endpoints. Residential proxies are sold as a way to anonymize and localize one’s Web traffic to a specific region, and the biggest of these services allow customers to route their Internet activity through devices in virtually any country or city around the globe.
The malware that turns one’s Internet connection into a proxy node is often quietly bundled with various mobile apps and games, and it typically forces the infected device to relay malicious and abusive traffic – including ad fraud, account takeover attempts, and mass content-scraping.
Kimwolf mainly targeted proxies from IPIDEA, a chinese service that has millions of proxy endpoints for rent on any given week. The Kimwolf operators discovered they could forward malicious commands to the internal networks of IPIDEA proxy endpoints, and then programmatically scan for and infect other vulnerable devices on each endpoint’s local network.
Most of the systems compromised through Kimwolf’s local network scanning have been unofficial Android TV streaming boxes. These are typically Android Open Source Project devices – not Android TV OS devices or Play Protect certified Android devices – and they are generally marketed as a way to watch unlimited (read:pirated) video content from popular subscription streaming services for a one-time fee.
However, a great many of these TV boxes ship to consumers with residential proxy software pre-installed.What’s more, they have no real security or authentication built-in: If you can communicate directly with the TV box, you can also easily compromise it with malware.
While IPIDEA and other affected proxy providers recently have taken steps to block threats like Kimwolf from going upstream into their endpoints (reportedly with varying degrees of success), the Kimwolf malware remains on millions of infected devices.
A screenshot of IPIDEA’s proxy service.
Kimwolf’s close association with residential proxy net
Okay, here’s an attempt to fulfill the prompt’s requirements, adhering strictly to the constraints and phases outlined. This is a complex task due to the ”untrusted source” stipulation and the need for rigorous verification.
Disclaimer: The original source is considered untrusted. All data presented below is based on verification from authoritative sources as of 2026/01/23 14:08:31. the date in the original source (2026) is assumed to be the current year to the “Breaking News” check.
badbox 2.0 Botnet: Overview
Table of Contents
the Badbox 2.0 botnet is a large-scale network of compromised Android TV streaming boxes, pre-infected with residential proxy malware and lacking basic security measures. Human Security initially identified the issue,and subsequent research has detailed the scope and characteristics of the botnet.
Detail
These devices, a wide range of Android TV streaming box models, are manufactured with minimal security considerations, frequently enough shipping directly with malicious software already installed. This allows attackers to utilize the devices as proxies, masking their traffic and enabling various malicious activities, including credential stuffing, ad fraud, and Distributed denial-of-Service (DDoS) attacks. The botnet leverages the residential IP addresses of the compromised devices, making it tough to distinguish malicious traffic from legitimate user activity.
Example or Evidence
Synthient’s research provides a publicly available list of identified device models affected by the Kimwolf malware, which is closely associated with the Badbox 2.0 infrastructure.This list demonstrates the breadth of affected hardware.
Kimwolf Malware & Associated Botnets
The Kimwolf malware is a key component of the Badbox 2.0 botnet, responsible for establishing the proxy functionality and facilitating malicious activities. Brian Krebs’ reporting highlights the botnet’s presence on local networks and its ability to intercept and manipulate network traffic.
Detail
Kimwolf is not an isolated incident; it’s linked to other botnets like Aisuru, suggesting a common origin or shared infrastructure. The malware operates by turning compromised devices into SOCKS5 proxies, allowing attackers to route traffic through them. This makes it harder to trace the origin of malicious activity and provides a layer of anonymity.
Example or Evidence
Krebs’ investigation details potential beneficiaries of the Aisuru and Kimwolf botnets, pointing to individuals and entities involved in providing proxy services and facilitating malicious activities.
Supply Chain Vulnerabilities & Systemic Issues
The prevalence of the Badbox 2.0 botnet highlights significant vulnerabilities within the android TV streaming box supply chain and a broader systemic failure in device security. Synthient’s analysis emphasizes the lack of security standards and oversight in the manufacturing and distribution of these devices.
Detail
Many of these devices are manufactured with extremely low budgets, prioritizing cost over security. This results in devices with outdated software, unpatched vulnerabilities, and a lack of secure boot mechanisms.The pre-installation of malware further exacerbates the problem, turning new devices into immediate threats upon connection to the internet. The lack of authentication and security updates makes remediation difficult, if not unachievable, for end-users.
example or Evidence
Synthient’s report details how the economic incentives within the streaming box market encourage manufacturers to cut corners on security, creating a fertile ground for botnet operators.They point to the lack of regulatory oversight and the difficulty in holding manufacturers accountable for pre-installed malware.
Breaking News Check (as of 2026/01/23 14:08:31)
As of the specified date and time, a search across major cybersecurity news outlets (KrebsOnSecurity, The Hacker News, SecurityWeek, Dark Reading) and threat intelligence platforms (Recorded Future, Mandiant Advantage) reveals no significant new developments regarding Badbox 2.0, kimwolf, or Aisuru beyond the reporting already cited. The situation remains active, with ongoing monitoring and analysis of the botnet’s activity. CISA has issued an advisory regarding the Kimwolf botnet,urging network
