frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

The Kimwolf botnet is stalking your local network

https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/
175•SamValYlieRcHE2•4d ago

Comments

ConorSheehan1•4d ago
Very interesting! A tutorial to check if kimwolf is running on your network would be nice
nubinetwork•4d ago
Based on the article, try looking for android devices with adb running on the network.
thenthenthen•4d ago
This article[0] includes a link to a online checker: https://synthient.com/check

Have not tested it myself ymmv.

[0] https://synthient.com/blog/a-broken-system-fueling-botnets

nubinetwork•4d ago
It only references a database of publicly scanned IPs, it won't help you if the device is behind a nat router.
HappyPanacea•4d ago
Does someone know if the port must be 5555 for this botnet?
tgv•3d ago
It's the Android debugger port, and it's used for infection, but the article doesn't exclude other methods nor mentions ports used by the malware.
pamcake•4d ago
Not exactly the answer but if you have one of the affected mentioned devices it should be listening on TCP port 5555. You can do a port scan for that.

   nmap -Pn 192.168.0.0/16 -p 5555
Replace netmask as appropriate.

Now that it's publicly known I guess it's possible that they will close the door post-infection to avoid detecton. And it won't detect any other devices it's spread further to.

If you have a cheapo Android-based TV box or stick like the ones mentioned, throw it out or reflash it with Armbian after forensics.

I'm sure there are HN readers out there who have one of these. They were very popular a couple of years back.

BloodyIron•3d ago
Well the first thing to check is, do you own and operate any of these janky Android "TV" boxes sold by companies nobody has heard of? If yes? Then there's probably your answer.
pamcake•4d ago
This is wild.

It must be crowded on these devices by now - it may be a bit misleading to think of it as a single botnet when there are multiple unrelated entities controlling the same devices via the same methods.

haburka•3d ago
I love how frequently Botnet creators reference Krebs. Like they are his biggest fans, and they just want a shoutout on his blog.
BloodyIron•3d ago
How is it not obvious to everyone reading HN that janky Android "TV" boxes (like the article references) are a by-default threat?

Like seriously, many of them are sold for stupid cheap prices like $5/ea. Or advertise unlimited movies/shows/etc for similarly unbelievable prices.

Putting aside the copyright infringement aspect of it, to me it's extremely obvious "wait... _why_ am I paying so little here?".

No, it's not because movies and shows are 99.9999% profit (spoiler: they aren't), it's because you're _paying_ to install a backdoor that will rip and tear everything on your network it can.

You like having a credit card? That's precious, it's mine now.

Look at me, I'm the network now.

kadoban•3d ago
> it's because you're _paying_ to install a backdoor that will rip and tear everything on your network it can.

I mean, maybe. More likely imo you're paying for the absolute cheapest hardware and fastest never-updated software someone could throw together and make _any_ profit on. Someone probably had 100k shitty little chips sitting in a warehouse and this was a way to do something with them.

The outcome is really the same, it's just the steps to get there are more human nature.

BloodyIron•3d ago
At a price tag of $5/ea the cost of just advertising and distribution exceeds the cost of the product itself. There is zero room for profit. The business model is installing back doors to the "clients" and stealing money, information, and anything else from them. Consider that even the cost of the included remote is a huge part of the actual hardware cost, and nobody is going to buy something like this without a remote.
kube-system•1d ago
Even many TVs with "reputable" western brand names, on the shelf at major US retailers, are often sold at a loss on the hardware and the difference is made up by collecting advertising data.

https://www.broadbandtvnews.com/2024/11/18/tv-companies-sell...

> you just have to look at the finances of Vizio or Roku to see they’re selling TVs at somewhere between -3 and -7% margin

BloodyIron•1d ago
Wow those negative margins are WILD!
GolfPopper•1d ago
>you're _paying_ to install a backdoor that will rip and tear everything on your network it can*

How is this different from buying hardware and software from big market players?

electroglyph•1d ago
they just steal different things
lubujackson•23h ago
*Samsung Core Features has the chat.*
themafia•1d ago
It's quite obvious to everyone here.

Why it's not obvious to every Senator and Representative in our Government is frustrating to an extreme.

We really do need to end our enhance our trade protections one way or another.

reactordev•1d ago
Money talks
23434dsf•1d ago
Some people love money more than they love you
toast0•1d ago
> Or advertise unlimited movies/shows/etc for similarly unbelievable prices.

I mean, it's pretty obvious the services are paid piracy. But it's got to cost something to pull VOD movies from wherever and serve them with an http server limited at 8 mbps even for content that exceeds that. Obviously someone doesn't want the content they stole to be easy to steal... too bad you can't reasonably play it either. :P

nextzck•1d ago
Shit man my Pet Feeder setup a back door to my network.. ended up reverse engineering the entire tuya piece of shit just so I could keep the automatic feeder running.

Fucking everyone is spying. I started downloading and decrypting apps from the App Store. It’s a god damn nightmare. Random apps are storing keys in the keychain (thanks expo!) that never leave our apple account. They follow us forever. You can’t delete them. Well.. there’s one way but it involves backing up your phone, putting it in recovery mode, and restoring from backup.

polishdude20•3d ago
So is there some catch all setting I can enable in my router to prevent my devices talking to eachother on the local network?
kadoban•3d ago
In most shitty routers: no. They don't even have raw ability to do that.

You can look around for something like device isolation, but I doubt you'll find it unless you go a couple of steps up from whatever router ISPs ~give away these days.

0xR1CK•1d ago
My ISP's router has isolation. Has had for 5+ years. Main SSID has it off so we can do LAN stuff. Guest SSID is used for IoT things and isolation turned off. Handy.
olyjohn•1d ago
What exactly does it isolate? An SSID? IP addresses? individual MAC addresses? How does this stop a pre-infected device you purchased from shitting traffic out of your network, acting as a residential proxy or try to own your other IoT devices?
kadoban•1d ago
The one I've seen on ~basic consumer routers just disallows wifi devices from talking to each other at all, it won't route between them. I usually need something more nuanced personally, but it's not a bad start at all.
aspbee555•1d ago
usually lan devices do not talk to the router unless they need a resource outside your lan network

you can however isolate with vlans and a vlan capable switch, then it would be on the router to isolate traffic between lans (I do exactly this for my less trusted virtual machines)

gopher_space•1d ago
I'm in the middle of setting up DD-WRT on an old router (I'd use OpenWRT if I could) just to play around with VLANs and AP isolation.
IgorPartola•1d ago
Instead of that I highly recommend either setting up a VM or picking up a $35 thin client and running OPNSense. After years of OpenWRT/DD-WRT I switched about 5 years ago and oh my god what a difference. You will spend basically 0 time on system maintenance and just focus on the actual networking stuff. It has more knobs than a basic router but the UI is excellent and there are very few bugs, if any.
pamcake•1d ago
Heads up that even if you block local forwarding in the router, it won't always be enough to prevent devices talking to each other over, say, an unmanaged switch or a wifi link.

Some (even cheap) unmanaged switches have a "vlan" or "isolation" switch that does exactly that, where only one or two "uplink" or "wan" ports can talk to the rest. If you have a managed switch, vlans is what most people would use for isolation.

On the software side you could also assign /32 IPv4 addresses only and add explicit ip route for the router only.

yjftsjthsd-h•1d ago
Sometimes; I've seen it called client isolation or something like that. Or, yeah, if you can get under the hood it's probably as easy as one or two iptables rules (or nftables or whatever).
olyjohn•1d ago
Is this true? For devices on the same subnet, I'm petty sure they don't even have to takl to the router. Maybe a managed switch can stop it, but I doubt most home routers have anything more than a dumb switch in them.
yjftsjthsd-h•1d ago
It depends™:) Yeah, if you have a dumb switch with devices plugged in, then the upstream router probably isn't relevant. But if you've got all devices on wifi running through a single box that's a router+switch+WAP+modem (very common in consumer home networking) then that single network box is in an excellent position to control devices talking to each other. YMMV.
Nextgrid•3d ago
> to relay malicious and abusive Internet traffic — such as ad fraud, account takeover attempts and mass content scraping

Oh no, let me get my tiny violin! Really hard to feel bad here. For most home users (that don’t expose anything sensitive on their LAN) these boxes are not a threat, seem to be doing a useful service in providing a superior streaming service that the balkanized official ones, and also shits on internet spammers/advertisers and frees up loginwalled content - sounds like a pretty good box really.

hedora•3d ago
I’d be nice to control where the money and content go. If I could, I’d strongly consider firing up an old raspberry pi or two.

Also, is there a better word than ad fraud? It needs an innocuous sounding euphemism like pretty much everything else involving that industry has. “Monetizing ad display”? “User-agent driven conversions?”

cryzinger•1d ago
The actual industry lingo is "invalid traffic" :P
crtasm•1d ago
Until all their accounts get pwned due to credential stuffing over this or a similar botnet - being the average person with weak, reused passwords?
Nextgrid•1d ago
The majority of accounts out there don't have anything of value. If it gets pwned the person just resets their password and calls it a day (in fact due to the lack of password manager their usual workflow is to reset the password anyway on each login since they never remember whatever variation of their shitty weak password they used).
themafia•1d ago
> sounds like a pretty good box really.

You can buy a better one that does not have malware installed. So these are complete and total garbage and no sane person should run them under any circumstance. Sounds like you have a bias which has prevented you from thinking about this clearly.

Nextgrid•1d ago
> You can buy a better one that does not have malware installed.

You can buy a better one if you have the technical know-how. But if you did you'd probably be running the *arr stack anyway and not need such a box. But these boxes do work and aren't any more of a threat than your usual public Wi-Fi for the casual user who does not expose any services to the LAN.

The alarm around them is less about the threat to its owner and more about the threat to the tech ecosystem at large... which considering how hostile it is to users, shouldn't really be something they have any reason to worry about.

cogman10•1d ago
How hard would it be to grab one of these little virus boxes and flash it with linux?
CryptoBanker•23h ago
Well then you just have a very overpriced, extremely low power linux box that doesn't do what you want it to do
yjftsjthsd-h•1d ago
> However, shipping these devices with ADB turned on creates a security nightmare because in this state they constantly listen for and accept unauthenticated connection requests.

I'm confused. I intentionally use ADB over the network sometimes, and I have to explicitly interactively allow each adb client by its key. Are they shipping boxes with adb configured to just allow any connection without any verification?

bix6•1d ago
I know this may seem trivial for many here but how can regular people easily check and debug their network for stuff like this?
tennysont•1d ago
Regular people don't need a "secure network". Phones and computers are, by default, secure against malicious networks.

Just don't run code you download from the internet or put your passwords to important accounts into cheap devices and you'll be fine. Normally people don't the the former, but sometimes do the latter.

edit: To be clear: the bitterness in this comment comes from how many developers assume loopback is secure. However, most website are allowed to send requests to local ports on your computer (IIRC) so that assumption is basically completely false. This is forgivable, except in a world where every developer runs tons of extensions/scripts/open-source apps, and have next-to-zero blast-radius-reduction methods, it makes me sad.

thot_experiment•1d ago
Sure they can send requests but they can't receive them unless you've got misconfigured CORS. I guess there's DNS rebinding but like, idk, attack surface seems pretty small. This sort of stuff isn't really worth worrying about unless you're an idiot or likely to be the victim of a targeted attack. I happily run code off the internet all the time and it seems fine. If there's one thing that really seems like a mind virus it's the paranoia all security people get, I can't imagine living life like that. I'm ok getting pwned every few decades if the tradeoff is never worrying about this shit.

Maybe I've just gotten lucky?

(i will say putting a device not running open source software/firmware or something very locked down like a phone on your LAN is insanity, i could never)

bix6•23h ago
Regular people download shit all the time though? Especially now with GPT, everyone is a programmer pasting code into command line. And how many people have IoT devices that they have to connect to WiFi? That’s total blind trust.

Every time I ask this question nobody is able to give me a solid answer :/

tennysont•1d ago
I couldn't really follow the technical details of the malware from the article, so I found what seems to be the first major report on the topic:

https://blog.xlab.qianxin.com/kimwolf-botnet-en/#network-pro...

That article has a more technical lens. It focuses primarily on the size and detection evasion methods of Kimwolf, rather than some notable (and definitely not unique) method of spreading.

Without looking too deeply, I'm going to assume that this is a successful botnet because it managed to get into product supply lines at big box stores and in app store games, rather than some clever virus that is spreading across the world.

I hope someone will correct me if I am mistaken!

VladVladikoff•1d ago
What’s the deal with that seemingly random address written out as a domain name? Brian krebb’s home address?

14 emelia terrace west roxbury ma 02132 . su

As for your assumption the OP talks about how it uses residential proxies to get into lans, I don’t think it is a supply chain attack.

WorldMaker•19h ago
Krebs redacted the one that was his own home address. Certainly someone's home address: https://www.zillow.com/homedetails/14-Emelia-Ter-West-Roxbur...

“Stop Designing Languages. Write Libraries Instead” (2016)

https://lbstanza.org/purpose_of_programming_languages.html
126•teleforce•2h ago•68 comments

A4 Paper Stories

https://susam.net/a4-paper-stories.html
89•blenderob•2h ago•38 comments

LaTeX Coffee Stains [pdf]

https://ctan.math.illinois.edu/graphics/pgf/contrib/coffeestains/coffeestains-en.pdf
12•zahrevsky•21m ago•2 comments

The Eric and Wendy Schmidt Observatory System

https://www.schmidtsciences.org/schmidt-observatory-system/
38•pppone•2h ago•27 comments

Show HN: KeelTest – AI-driven VS Code unit test generator with bug discovery

https://keelcode.dev/keeltest
13•bulba4aur•1h ago•4 comments

Formal methods only solve half my problems

https://brooker.co.za/blog/2022/06/02/formal.html
46•signa11•4d ago•14 comments

Everyone hates OneDrive, Microsofts cloud app that steals and deletes files

https://boingboing.net/2026/01/05/everyone-hates-onedrive-microsofts-cloud-app-that-steals-then-d...
41•mikecarlton•1h ago•20 comments

The first new compass since 1936

https://www.youtube.com/watch?v=eiDhbZ8-BZI
52•1970-01-01•5d ago•33 comments

Vector graphics on GPU

https://gasiulis.name/vector-graphics-on-gpu/
108•gsf_emergency_6•4d ago•19 comments

Stop Doom Scrolling, Start Doom Coding: Build via the terminal from your phone

https://github.com/rberg27/doom-coding
503•rbergamini27•19h ago•352 comments

Opus 4.5 is not the normal AI agent experience that I have had thus far

https://burkeholland.github.io/posts/opus-4-5-change-everything/
681•tbassetto•21h ago•968 comments

Optery (YC W22) Hiring a CISO and Web Scraping Engineers (Node) (US and Latam)

https://www.optery.com/careers/
1•beyondd•3h ago

Electronic nose for indoor mold detection and identification

https://advanced.onlinelibrary.wiley.com/doi/10.1002/adsr.202500124
156•PaulHoule•14h ago•87 comments

Show HN: SMTP Tunnel – A SOCKS5 proxy disguised as email traffic to bypass DPI

https://github.com/x011/smtp-tunnel-proxy
102•lobito25•14h ago•34 comments

The creator of Claude Code's Claude setup

https://twitter.com/bcherny/status/2007179832300581177
491•KothuRoti•4d ago•320 comments

A 30B Qwen model walks into a Raspberry Pi and runs in real time

https://byteshape.com/blogs/Qwen3-30B-A3B-Instruct-2507/
292•dataminer•18h ago•101 comments

Show HN: Comet MCP – Give Claude Code a browser that can click

https://github.com/hanzili/comet-mcp
9•hanzili•3d ago•5 comments

Vietnam bans unskippable ads

https://saigoneer.com/vietnam-news/28652-vienam-bans-unskippable-ads,-requires-skip-button-to-app...
1470•hoherd•22h ago•747 comments

On the slow death of scaling

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5877662
96•sethbannon•11h ago•19 comments

I wanted a camera that doesn't exist, so I built it

https://medium.com/@cristi.baluta/i-wanted-a-camera-that-doesnt-exist-so-i-built-it-5f9864533eb7
421•cyrc•4d ago•131 comments

Oral microbiome sequencing after taking probiotics

https://blog.booleanbiotech.com/oral-microbiome-biogaia
168•sethbannon•17h ago•72 comments

Investigating and fixing a nasty clone bug

https://kobzol.github.io/rust/2025/12/30/investigating-and-fixing-a-nasty-clone-bug.html
20•r4um•5d ago•0 comments

We recreated Steve Jobs's 1975 Atari horoscope program

https://blog.adafruit.com/2026/01/06/we-recreated-steve-jobss-1975-atari-horoscope-program-and-yo...
87•ptorrone•14h ago•38 comments

The ISEE Trajectories

https://www.drmindle.com/isee/
5•drmindle12358•2d ago•4 comments

What *is* code? (2015)

https://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/
65•bblcla•5d ago•25 comments

CES 2026: Taking the Lids Off AMD's Venice and MI400 SoCs

https://chipsandcheese.com/p/ces-2026-taking-the-lids-off-amds
123•rbanffy•17h ago•70 comments

Calling All Hackers: How money works (2024)

https://phrack.org/issues/71/17
300•krrishd•18h ago•190 comments

Launch HN: Tamarind Bio (YC W24) – AI Inference Provider for Drug Discovery

74•denizkavi•21h ago•17 comments

Sergey Brin's Unretirement

https://www.inc.com/jessica-stillman/google-co-founder-sergey-brins-unretirement-is-a-lesson-for-...
266•iancmceachern•6d ago•335 comments

High-Performance DBMSs with io_uring: When and How to use it

https://arxiv.org/abs/2512.04859
154•matt_d•19h ago•41 comments