TL;DR
Researchers at Synthient say the Kimwolf botnet has infected over two million devices worldwide by tunneling through commercial residential proxy services into users' local networks. The malware relies heavily on insecure Android TV boxes and other IoT devices shipped with weak defaults and preinstalled proxy software.
What happened
Security researchers tracked rapid, recent growth of a botnet called Kimwolf that now appears on more than two million devices globally, with concentrations in Vietnam, Brazil, India, Saudi Arabia, Russia and the United States. Synthient found that roughly two-thirds of those infections are Android TV boxes that lack basic security or authentication. Operators behind Kimwolf abuse residential proxy services to reach internal RFC-1918 address spaces on proxy endpoints, using DNS records that point to local addresses to bypass proxy filters. Many compromised endpoints run proxy software installed via dodgy apps or preinstalled on low-cost Android TV boxes and digital photo frames; several of those devices ship with Android Debug Bridge (ADB) enabled by default, allowing unauthenticated administrative access. Kimwolf is used for ad fraud, credential abuse, data scraping and powerful distributed-denial-of-service attacks, and researchers observed the botnet rebuilding itself after takedown attempts by reusing large proxy pools.
Why it matters
- Residential proxy services can be abused to pivot into private home and office networks, undermining assumed router/firewall protections.
- Large numbers of inexpensive consumer devices are shipping insecurely, expanding the pool of easily compromised endpoints.
- Kimwolf’s capabilities include monetizable abuse — ad fraud, account takeover attempts, content scraping — and DDoS attacks that can disrupt websites at scale.
- The botnet has shown rapid growth and resilience after takedowns by leveraging extensive proxy pools, increasing the challenge of mitigation.
Key facts
- Synthient reported more than 2 million devices infected with Kimwolf.
- Infections are concentrated in Vietnam, Brazil, India, Saudi Arabia, Russia and the United States.
- About two-thirds of Kimwolf infections are Android TV boxes with no security or authentication built in.
- Kimwolf operators abuse residential proxy services by using DNS records that point to RFC-1918 local addresses to reach devices on proxy endpoints’ internal networks.
- Many compromised devices either ship with malware preinstalled or require unofficial app stores that install proxy software.
- Several device classes targeted include unofficial Android TV boxes and Android-based digital photo frames
- Numerous unofficial Android TV boxes were found shipped with Android Debug Bridge (ADB) enabled by default, allowing unauthenticated remote access.
- Researchers observed a one-to-one overlap between new Kimwolf infections and proxy IPs offered by China-based IPIDEA, a large residential proxy provider.
- Operators monetize Kimwolf through app installs, selling proxy bandwidth and offering DDoS functionality for hire.
- Synthient observed Kimwolf rapidly rebuild after a takedown by reusing proxy endpoints to distribute its payload.
What to watch next
- Whether major residential proxy providers implement fixes to block DNS records that resolve to RFC-1918/local addresses — not confirmed in the source.
- Actions by e-commerce platforms and device vendors to remove or recall unofficial Android TV boxes and photo frames preloaded with proxy software — not confirmed in the source.
- Continued growth and resilience of the Kimwolf botnet after takedown attempts, as observed by Synthient.
Quick glossary
- Botnet: A network of compromised devices remotely controlled by attackers and used to carry out malicious activities such as DDoS attacks or fraud.
- Residential proxy: A service that routes traffic through residential devices or IP addresses to make requests appear to originate from a household or specific location.
- RFC-1918: A set of Internet standards that define private IP address ranges used within local networks (for example, 10.0.0.0/8 and 192.168.0.0/16).
- Android Debug Bridge (ADB): A development tool that enables remote access and administrative commands on Android devices; if exposed, it can allow unauthenticated control.
- DDoS (Distributed Denial of Service): An attack that floods a target with traffic from many sources to overwhelm and disrupt services.
Reader FAQ
How does Kimwolf spread into local networks?
Researchers say operators tunnel through residential proxy services by using DNS records that resolve to local RFC-1918 addresses, then deliver malware to devices on proxy endpoints’ internal networks.
Which devices are most affected?
Synthient reports about two-thirds of infections are Android TV boxes; digital photo frames and other low-cost Internet devices are also targeted.
How large is the botnet?
Synthient tracked roughly two million infected devices and noted rapid expansion via large proxy pools.
Who discovered Kimwolf?
The activity was tracked and reported by Benjamin Brundage and his firm Synthient, based on research from mid to late 2025.
Will my home router keep me safe?
Not confirmed in the source.

January 2, 2026 0 Comments The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been…
Sources
- The Kimwolf Botnet is Stalking Your Local Network
- Kimwolf Exposed: The Massive Android Botnet with 1.8 …
- Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches …
- Massive Kimwolf botnet targets Android devices
Related posts
- Video archive: Talks from the 39th Chaos Communication Congress (39C3), 2025
- NCA’s Gavin Webb awarded OBE for leading LockBit Operation Cronos takedown
- How Protesters Became Content for the Cops: The Spectacle of Protest Policing