Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
970x20 Itcentric
Kimwolf: The IoT botnet that moves silently across corporate and government networks

Kimwolf: The IoT botnet that moves silently across corporate and government networks

24 January 2026 10:12

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently.

According to the latest analyses, this malicious infrastructure has already compromised over two million devices , exploiting them for distributed denial-of-service attacks and as intermediate nodes for abusive traffic. Its true strength, however, isn’t its sheer size, but its ability to infiltrate networks that were never conceived as fertile ground for an IoT botnet.

A botnet that looks inside networks

Kimwolf doesn’t just monitor isolated devices. Once it gains access, the malware actively scans the local network for other vulnerable systems. This behavior allows operators to spread the infection laterally, turning a single entry point into a potential problem for the entire network infrastructure.

The botnet’s growth accelerated throughout 2025 due to the abuse of residential proxy services . These platforms, designed to route traffic through home IP addresses in various geographic areas, were exploited to route commands to exposed IoT devices, bypassing traditional security controls.

Large providers, including services with millions of endpoints available weekly, were used as distribution channels. Through these proxies, Kimwolf was able to reach devices that would otherwise not be directly accessible from the internet.

Android TV box: the Achilles heel

The core of the Kimwolf infrastructure is largely composed of uncertified Android TV boxes , based on open-source versions of the operating system. These are inexpensive devices, often sold for access to pirated content, that arrive on the market without adequate security protections .

In many cases, these media players include pre-installed proxy software , exposed backdoors, or no authentication mechanisms. Once accessed, they can be easily compromised and turned into persistent botnet nodes, difficult to clean up or update.

Even after proxy providers introduced some countermeasures, millions of devices remain infected. The persistence of the threat is linked to the very nature of the hardware: poorly managed, rarely updated, and often abandoned.

An unexpected presence in sensitive environments

Investigations conducted by Infoblox show that Kimwolf-related activity has been observed across a wide range of corporate and government networks . DNS queries to the botnet’s command and control domains originate from organizations in critical sectors such as healthcare, education, finance, and government.

Further technical analysis, attributed to experts at Spur.us , identified tens of thousands of IP addresses associated with vulnerable proxy services within universities, businesses, and government networks. In several cases, these proxies provide an entry point that allows attackers to observe or explore internal segments of compromised networks.

The emerging picture is of an IoT botnet that doesn’t just generate noise, but can also provide an initial foothold within complex organizations, significantly expanding the attack surface.

The research that brought this infrastructure and its implications to light was published by Krebs on Security , offering a detailed look at how a seemingly “domestic” threat can have much broader consequences.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.