Kimwolf Android Botnet Uses Open ADB and Residential Proxies to Hijack Millions of Devices

CyberSecureFox 🦊

The rapidly expanding Kimwolf Android botnet, a new branch of the Aisuru malware family, has become one of the most powerful networks of compromised devices in circulation. According to Synthient’s telemetry, Kimwolf already controls almost two million Android hosts and cycles through around 12 million unique IP addresses every week, giving operators immense leverage for distributed denial-of-service (DDoS) attacks and abuse of residential IP space.

Kimwolf Botnet Origins and Links to Record-Breaking DDoS Attacks

Kimwolf is an evolution of the Aisuru malware, which was previously implicated in one of the largest DDoS attacks ever recorded. Data from Cloudflare indicates that this earlier campaign peaked at roughly 29.7 Tbps, underscoring how dangerous large-scale IoT and Android botnets can be when fully weaponized.

Researchers began to notice a sharp increase in Kimwolf activity around August of last year. Threat intelligence from QiAnXin XLab suggests that by early December 2025 the botnet had already amassed more than 1.8 million compromised Android devices, and subsequent observations from Synthient show that the number is rapidly closing in on two million as the infection campaign continues.

The majority of infected devices have been observed in Vietnam, Brazil, Russia, India, and Saudi Arabia. Many of these endpoints are low-cost Android TV boxes, streaming sticks, and set-top boxes deployed in home networks. A notable proportion of them ship with preinstalled proxy SDKs, which later become a key enabler for compromise.

How Residential Proxy Networks Fuel Kimwolf’s Expansion

A critical factor in the botnet’s growth is its systematic abuse of residential proxy networks. These networks are built from everyday user devices—PCs, smartphones, smart TVs, and TV boxes—where an SDK or dedicated app transforms the device into a relay node. Legitimate use cases include web scraping and ad verification, but the same infrastructure can easily be repurposed to mask malicious traffic.

Synthient’s analysis indicates that Kimwolf operators actively favor proxy providers that allow access to local IP addresses and a broad range of TCP ports. This configuration gives attackers a path from the public internet into the internal networks behind home routers. As a result, Android TV boxes and other devices that appear unreachable from the outside are suddenly exposed via the residential proxy client running on the same LAN.

Abusing Open Android Debug Bridge (ADB) on Consumer Devices

Since November 2025, security analysts have observed a spike in scans for unauthenticated Android Debug Bridge (ADB) services conducted through these proxy endpoints. ADB is a built-in Android tool that allows developers to remotely debug, manage, and control devices, including installing applications and executing system commands.

Kimwolf specifically searches for accessible ADB instances on ports 5555, 5858, 12108, and 3222. On many budget Android TV boxes and streaming devices, ADB is enabled by default and configured without authentication. Examination of the IPIDEA residential proxy pool showed that approximately 67% of Android devices reachable via the network did not require any form of authorization, leaving them wide open to remote code execution.

Across the internet-facing and proxy-exposed address space, researchers identified roughly six million potentially vulnerable IPs with exposed ADB. Some of the affected devices appear to reach consumers with proxy SDKs preinstalled at the factory, effectively shipping with a ready-made channel for abuse.

Kimwolf Infection Chain: From ADB Access to Full Botnet Control

Once Kimwolf operators obtain ADB access, they deploy malware with classic Unix utilities such as netcat or telnet, streaming shell scripts directly onto the device. These payloads are commonly written to locations like /data/local/tmp and executed locally, which installs the Kimwolf components and enrolls the device into the command-and-control (C2) infrastructure.

Compromised Android TV boxes do more than participate in DDoS attacks. They are also monetized as nodes in anonymous proxy networks and via installation of third-party SDKs, including platforms such as Plainproxies Byteconnect. This model allows the attackers to profit simultaneously from traffic reselling, click fraud, and DDoS-for-hire operations, squeezing multiple revenue streams from each infected device.

Proxy Provider Response and Risks for Home and Enterprise Users

One of the most affected providers in this campaign has been IPIDEA, which initially allowed unrestricted access to local networks and all ports—a configuration highly attractive to Kimwolf operators. After receiving notification from Synthient, IPIDEA reportedly restricted access to local subnets and broad port ranges in late December, reducing but not eliminating the attack surface.

Researchers have submitted around a dozen vulnerability and abuse reports to the main proxy platforms identified in connection with Kimwolf. However, mapping the full set of services and SDKs involved remains challenging, highlighting how fragmented and opaque the residential proxy ecosystem has become.

For end users, the core risk lies in the fact that many inexpensive Android and IoT devices are shipped with both preinstalled proxy SDKs and ADB enabled by default. This combination effectively turns the device into a publicly reachable proxy node with a built-in remote control interface, even if the owner never changes a single setting.

The Kimwolf campaign illustrates how dangerous the mix of residential proxies, weak default configurations, and exposed ADB can be in the Android and IoT landscape. Users should disable ADB on TV boxes and streaming devices, restrict inbound access to local networks, apply firmware updates, and regularly review installed apps and their permissions. Organizations need to inventory all connected Android and IoT assets, block unauthorized proxy SDKs, and implement network segmentation to isolate high-risk devices. Widespread adoption of these basic controls will make it significantly harder for botnet operators to convert home and corporate environments into infrastructure for DDoS attacks and covert proxy services.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.