Back to News
vulnerability🌐InternationalKrebs on Security

Kimwolf Botnet Exploits Residential Proxies to Infiltrate Home Networks

Friday, January 2, 2026

Kimwolf Botnet Exploits Residential Proxies to Infiltrate Home Networks

What

The Kimwolf botnet has rapidly grown to infect over 2 million devices globally, primarily insecure Android TV boxes and digital photo frames. It leverages a critical vulnerability in residential proxy services to bypass network firewalls and infect devices within internal home networks, forcing them to conduct ad fraud, account takeovers, and crippling DDoS attacks.

Where

Globally, with concentrations in Vietnam, Brazil, India, Saudi Arabia, Russia, and the United States. Affected systems include Android TV boxes and digital photo frames sold on major e-commerce sites.

When

Discovered and tracked since October 2025 by Synthient. Vulnerability exploited for months prior.

Key Factors

  • The Kimwolf botnet exploits a critical flaw in residential proxy networks, allowing it to bypass assumed firewall protection by forwarding requests to internal network addresses through manipulated DNS settings.
  • A significant portion of infected devices are unofficial Android TV boxes and digital photo frames that come with pre-installed malware or lack fundamental security and authentication, making them easily compromised.
  • The botnet forces compromised devices to participate in ad fraud, account takeover attempts, content scraping, and large-scale distributed denial-of-service (DDoS) attacks, posing a significant threat to internet stability and user security.

Takeaways

  • Immediately audit all network-connected devices, especially Android TV boxes and digital photo frames, for suspicious activity or pre-installed proxy software, and consider disconnecting unverified devices.
  • Users of residential proxy services should be aware of the inherent risks, as their devices can become entry points for malware into their local networks if the proxy service has inadequate internal network request filtering.
Read Full Article

Opens original article on Krebs on Security

Similar News