Raleigh, NC

32°F
Scattered Clouds Humidity: 57%
Wind: 1.34 M/S

Massive Kimwolf Botnet Hijacks 1.8 million Android Devices and Briefly Outpaces Google

Massive Kimwolf Botnet Hijacks 1.8 million Android Devices and Briefly Outpaces Google

A massive new botnet called Kimwolf recently made headlines by briefly surpassing Google on the top websites chart. According to Cloudflare data, a strange domain acting as a command-and-control (C2) server became the most popular global website on October 30th. This activity led researchers at Xlab to uncover what they describe as one of the most significant botnets in history.

Kimwolf is estimated to control at least 1.8 million active Android devices. This scale rivals or even exceeds Aisuru, the previous record holder for the largest known botnet. Researchers

were able to gain insight into the operation by registering one of the C2 domains themselves. During a three-day observation period, they tracked 2.7 million unique source IP addresses, with over 1.8 million active on a single day.

Target Devices and Security Gaps

The botnet primarily targets residential Android devices, specifically set-top television boxes and tablets. These devices are often uncertified by Google, meaning they lack the built-in security of Google Play Protect. Because these gadgets are frequently used in residential networks, their IP addresses change over time, making it difficult to maintain an exact count of the infected hardware.

Malicious Capabilities

Xlab's analysis of the Kimwolf software reveals a highly versatile and dangerous toolkit. Beyond standard distributed denial-of-service (DDoS) capabilities, the botnet includes several advanced features:

  • Proxy Forwarding: This allows attackers to hide their actual locations and bypass geographical restrictions or IP blacklists.
  • Reverse Shell Access: Attackers gain command-line control over infected devices, enabling them to execute arbitrary commands.
  • File Management: The malware can upload, download, or modify files on the compromised devices.
  • Malware Deployment: The reverse shell and file management functions allow the operators to install additional malicious software on the bots at any time.

Researchers warn that a botnet of this size possesses destructive power that cannot be ignored. Its ability to launch massive cyberattacks while remaining hidden behind residential IP addresses poses a significant threat to global internet stability.

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

Cybersecurity Insight delivers timely updates on global cybersecurity developments, including recent system breaches, cyber-attacks, advancements in artificial intelligence (AI), and emerging technology innovations. Our goal is to keep viewers well-informed about the latest trends in technology and system security, and how these changes impact our lives and the broader ecosystem

Please fill the required field.