ASUS routers with warning indicators connected in network formation
HighMalware

KadNap Botnet Hijacks Thousands of ASUS Routers to Build Proxy Network

A new botnet campaign tracked as KadNap is actively hijacking thousands of ASUS routers, turning compromised devices into persistent proxy nodes used to route cybercriminal traffic — with backdoor access surviving reboots and firmware updates.

Emanuel DE ALMEIDA 10 Mar 2026, 16:01 2 min read 5 views 0 Comments

Last updated 11 Mar 2026, 02:11

Key Takeaways

KadNap Botnet Targets Thousands of ASUS Routers

Security researchers have identified an active botnet campaign called KadNap that is systematically compromising ASUS routers and other edge networking devices, turning infected hardware into proxy nodes used to route cybercriminal traffic. The campaign was first detected in early March 2026 after analysts noticed unusual traffic patterns originating from home and small business routers across multiple continents.

According to security researchers, more than 14,000 devices have already been confirmed as compromised. The infections are concentrated in North America, Europe, and Asia, with exposed routers accessible via default credentials or unpatched firmware being the primary targets.

How KadNap Exploits ASUS Router Vulnerabilities

The attack chain used by KadNap combines authentication bypass techniques, brute-force credential attacks, and known command injection vulnerabilities to gain privileged access. Researchers note that the campaign exploits weaknesses similar to CVE-2023-39780, a command injection flaw affecting multiple ASUS router product lines, alongside authentication bypass methods that had not been publicly assigned CVE identifiers at the time of initial disclosure.

ASUS router owners should also be aware of CVE-2025-2492, a critical authentication control vulnerability with a CVSS score of 9.2 that affects AiCloud-enabled routers and can allow unauthorized remote code execution. Security advisories from ASUS have urged users to apply the latest firmware updates and disable AiCloud if the feature is not required.

Backdoor Survives Reboots and Firmware Updates

One of the most concerning aspects of the KadNap campaign is its persistence. Once a router is compromised, the malware stores attacker-controlled configuration changes in non-volatile memory (NVRAM), meaning the backdoor remains active even after a full reboot or a firmware update is applied.

Researchers also observed that KadNap enables SSH access on non-standard ports — including TCP port 53282 — and injects attacker-controlled public keys for persistent remote access. Logging functions and certain built-in security protections are then disabled, making forensic detection significantly harder for end users and IT teams managing small office environments.

Proxy Network Powers Cybercrime Infrastructure

Once enrolled in the botnet, compromised ASUS routers are converted into proxy servers that mask the true origin of malicious traffic. This infrastructure is used to facilitate a range of cybercriminal activities including large-scale fraud, credential stuffing attacks, data theft, and anonymization services for illicit marketplaces.

Because the routers communicate with command-and-control servers using encrypted channels and mimic legitimate traffic patterns, detection at the network level is difficult without dedicated monitoring tools. Most home users and small business operators are unlikely to notice any significant performance degradation, making the botnet particularly effective as long-term covert infrastructure.

Why ASUS Routers Are a Prime Target

Edge devices like home and office routers are attractive targets for botnet operators because they remain online continuously, sit outside the security perimeter of most endpoint detection tools, and are rarely updated or monitored by their owners. ASUS holds a significant share of the consumer and SMB router market, making its devices a high-value target for campaigns that require scale.

Security experts emphasize that even routers running the latest firmware may remain backdoored if they were compromised before the update was applied, since KadNap's NVRAM persistence mechanism is not removed by a standard firmware flash without a full factory reset.

What ASUS Router Users Should Do Immediately

Security researchers recommend the following steps for all ASUS router owners:

  • Apply the latest available firmware update from the official ASUS support portal immediately.
  • Perform a full factory reset if compromise is suspected, as a standard reboot will not remove the backdoor.
  • Disable AiCloud and remote administration features if they are not actively required.
  • Replace default credentials with strong, unique passwords for both the admin panel and Wi-Fi networks.
  • Check SSH settings and disable SSH access if it is not needed.
  • Enable router logging and review traffic for anomalous outbound connections.

ASUS has not yet issued a specific advisory addressing the KadNap campaign directly, but existing guidance around CVE-2025-2492 and general router hardening best practices apply. Users who suspect their device has been compromised should perform a factory reset before applying updated firmware.

Frequently Asked Questions

What is the KadNap botnet?
KadNap is malware that infects ASUS routers and edge devices to create a proxy network for routing cybercriminal traffic.
How many devices has KadNap infected?
Security researchers report that KadNap has compromised over 14,000 ASUS routers and edge networking devices globally.
How does KadNap affect infected routers?
The malware converts compromised routers into proxy servers that mask malicious traffic origins while maintaining normal device performance.

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...