By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
Computing

Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers

News Room
Last updated: 2026/01/14 at 3:04 PM
News Room Published 14 January 2026
Share
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
SHARE

The Black Lotus Labs team at Lumen Technologies said it null-routed traffic to more than 550 command-and-control (C2) nodes associated with the AISURU/Kimwolf botnet since early October 2025.

AISURU and its Android counterpart, Kimwolf, have emerged as some of the biggest botnets in recent times, capable of directing enslaved devices to participate in distributed denial-of-service (DDoS) attacks and relay malicious traffic for residential proxy services.

Details about Kimwolf emerged last month when QiAnXin XLab published an exhaustive analysis of the malware, which turns compromised devices – mostly unsanctioned Android TV streaming devices – into a residential proxy by delivering a software development kit (SDK) called ByteConnect either directly or through sketchy apps that come pre-installed on them.

The net result is that the botnet has expanded to infect more than 2 million Android devices with an exposed Android Debug Bridge (ADB) service by tunneling through residential proxy networks, thereby allowing the threat actors to compromise a wide swath of TV boxes.

A subsequent report from Synthient has revealed Kimwolf actors attempting to offload proxy bandwidth in exchange for upfront cash.

Black Lotus Labs said it identified in September 2025 a group of residential SSH connections originating from multiple Canadian IP addresses based on its analysis of backend C2 for Aisuru at 65.108.5[.]46, with the IP addresses using SSH to access 194.46.59[.]169, which proxy-sdk.14emeliaterracewestroxburyma02132[.]su.

Cybersecurity

It’s worth noting that the second-level domain surpassed Google in Cloudflare’s list of top 100 domains in November 2025, prompting the web infrastructure company to scrub it from the list.

Then, in early October 2025, the cybersecurity company said it identified another C2 domain – greatfirewallisacensorshiptool.14emeliaterracewestroxburyma02132[.]su – that resolved to 104.171.170[.]21, an IP address belonging to Utah-based hosting provider Resi Rack LLC. The company advertises itself as a “Premium Game Server Hosting Provider.”

This link is crucial, as a recent report from independent security journalist Brian Krebs revealed how people behind various proxy services based on the botnets were peddling their warez on a Discord server called resi[.]to. This also includes Resi Rack’s co-founders, who are said to have been actively engaged in selling proxy services via Discord for nearly two years.

The server, which has since disappeared, was owned by someone named “d” (assessed to be short for the handle “Dort”), with Snow believed to be the botmaster.

“In early October, we observed a 300% surge in the number of new bots added to Kimwolf over a 7-day period, which was the start of an increase that reached 800,000 total bots by mid-month,” Black Lotus Labs said. “Nearly all of the bots in this surge were found listed for sale on a single residential proxy service.”

Subsequently, the Kimwolf C2 architecture was found to scan PYPROXY and other services for vulnerable devices between October 20, 2025, and November 6, 2025 — a behavior explained by the botnet’s exploitation of a security flaw in many proxy services that made it possible to interact with devices on the internal networks of residential proxy endpoints and drop the malware.

This, in turn, turns the device into a residential proxy node, causing its public IP address (assigned by the Internet Service Provider) to be listed for rent on a residential proxy provider site. Threat actors, such as those behind these botnets, then lease access to the infected node and weaponize it to scan the local network for devices with ADB mode enabled for further propagation.

Cybersecurity

“After one successful null route [in October 2025], we observed the greatfirewallisacensorshiptool domain move to 104.171.170[.]201, another Resi Rack LLC IP,” Black Lotus Labs noted. “As this server stood up, we saw a large spike of traffic with 176.65.149[.]19:25565, a server used to host their malware. This was on a common ASN that was used by the Aisuru botnet at the same time.”

The disclosure comes against the backdrop of a report from Chawkr that detailed a sophisticated proxy network containing 832 compromised KeeneticOS routers operating across Russian ISPs, such as Net By Net Holding LLC, VladLink, and GorodSamara.

“The consistent SSH fingerprints and identical configurations across all 832 devices point toward automated mass exploitation, whether leveraging stolen credentials, embedded backdoors, or known security flaws in the router firmware,” it said. “Each compromised router maintains both HTTP (port 80) and SSH (port 22) access.”

Given that these compromised SOHO routers function as residential proxy nodes, they provide threat actors with the ability to conduct malicious activities by blending into normal internet traffic. This illustrates how adversaries are increasingly leveraging consumer devices as conduits for multi-stage attacks.

“Unlike datacenter IPs or addresses from known hosting providers, these residential endpoints operate below the radar of most security vendor reputation lists and threat intelligence feeds,” Chawkr noted.

“Their legitimate residential classification and clean IP reputation allow malicious traffic to masquerade as ordinary consumer activity, evading detection mechanisms that would immediately flag requests originating from suspicious hosting infrastructure or known proxy services.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Texas judge throws out second lawsuit over CrowdStrike outage | Computer Weekly Texas judge throws out second lawsuit over CrowdStrike outage | Computer Weekly
Next Article Verizon outage: Why your phone says SOS, what we know so far Verizon outage: Why your phone says SOS, what we know so far
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

5 Cheap Audiophile Gadgets That Can Level Up Your Music Experience – BGR
5 Cheap Audiophile Gadgets That Can Level Up Your Music Experience – BGR
News
Semidefinite Relaxation for Hyperbolic SVMs: A Polynomial Approach | HackerNoon
Semidefinite Relaxation for Hyperbolic SVMs: A Polynomial Approach | HackerNoon
Computing
Musk's Starlink offering free satellite internet service in Iran, activists say
Musk's Starlink offering free satellite internet service in Iran, activists say
News
Improving Global Optimization in HSVM and SDP Problems | HackerNoon
Improving Global Optimization in HSVM and SDP Problems | HackerNoon
Computing

You Might also Like

Semidefinite Relaxation for Hyperbolic SVMs: A Polynomial Approach | HackerNoon
Computing

Semidefinite Relaxation for Hyperbolic SVMs: A Polynomial Approach | HackerNoon

1 Min Read
Improving Global Optimization in HSVM and SDP Problems | HackerNoon
Computing

Improving Global Optimization in HSVM and SDP Problems | HackerNoon

3 Min Read
Performance Analysis of Optimization Methods on Hyperbolic Embeddings | HackerNoon
Computing

Performance Analysis of Optimization Methods on Hyperbolic Embeddings | HackerNoon

4 Min Read
How this CO2 disposal startup raised investment despite funding and political headwinds
Computing

How this CO2 disposal startup raised investment despite funding and political headwinds

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?