Back to News
general🌐InternationalSecurity Affairs

Massive Android botnet Kimwolf infects millions, strikes with DDoS

Sunday, December 21, 2025

Massive Android botnet Kimwolf infects millions, strikes with DDoS

What

The Kimwolf Android botnet, identified by its standout C2 domain, has rapidly gained traction, infecting millions of devices and executing extensive DDoS attacks. Utilizing the wolfSSL library, it features advanced capabilities such as traffic proxying and encryption of sensitive data. The botnet's resilience is bolstered by its use of blockchain domains and covert communication techniques, posing significant challenges for detection and mitigation efforts.

Where

The botnet has a global reach, with infected devices reported in 222 countries, including significant concentrations in Brazil, India, and the USA.

When

The botnet was first identified in October 2025, with notable DDoS activity observed between November 19 and December 9, 2025.

Key Factors

  • Utilizes wolfSSL library for secure communications
  • Employs DNS over TLS and elliptic curve digital signatures for command authentication
  • Incorporates EtherHiding for resilience against takedowns

Takeaways

  • Organizations must prioritize the security of IoT devices, particularly smart TVs and TV boxes, which are often vulnerable.
  • The rapid evolution of malware like Kimwolf underscores the need for continuous threat intelligence sharing.
  • Proactive measures are essential to mitigate the risks posed by large-scale botnets.
Read Full Article

Opens original article on Security Affairs

Similar News