Image missing.
Kimwolf Botnet Lurking in Corporate, Govt. Networks

created: Jan. 31, 2026, 9:47 p.m. | updated: Feb. 1, 2026, 12:48 a.m.

Kimwolf grew rapidly in the waning months of 2025 by tricking various “residential proxy” services into relaying malicious commands to devices on the local networks of those proxy endpoints. Kimwolf mainly targeted proxies from IPIDEA, a Chinese service that has millions of proxy endpoints for rent on any given week. The Kimwolf operators discovered they could forward malicious commands to the internal networks of IPIDEA proxy endpoints, and then programmatically scan for and infect other vulnerable devices on each endpoint’s local network. Kimwolf’s close association with residential proxy networks and compromised Android TV boxes might suggest we’d find relatively few infections on corporate networks. Further reading:The Kimwolf Botnet is Stalking Your Local NetworkWho Benefitted from the Aisuru and Kimwolf Botnets?

9 hours, 30 minutes ago: Hacker News