A sophisticated and rapidly expanding Internet-of-Things (IoT) botnet, codenamed Kimwolf, has infiltrated over two million devices, weaponizing them for large-scale distributed denial-of-service (DDoS) attacks and the relay of illicit internet traffic. Its insidious ability to scan compromised local networks for additional IoT devices to infect poses a significant and alarming threat to organizations. Recent investigations reveal a surprisingly high prevalence of Kimwolf within government and corporate networks, raising serious cybersecurity concerns.
Kimwolf’s aggressive growth, particularly in the latter half of 2025, was facilitated by its exploitation of "residential proxy" services. These services, marketed to users seeking to anonymize and geo-localize their internet traffic, allow individuals to route their online activity through a vast network of devices, often located in diverse geographical regions. The malware responsible for turning these devices into proxy nodes is frequently bundled discreetly with mobile applications and games. Once installed, it compels the infected device to relay a wide array of malicious and abusive internet traffic, including ad fraud, account takeover attempts, and extensive content scraping.
A primary target of Kimwolf’s operations has been IPIDEA, a prominent Chinese residential proxy service boasting millions of rentable proxy endpoints. The operators of Kimwolf discovered a critical vulnerability: they could forward malicious commands to the internal networks connected to IPIDEA’s proxy endpoints. This allowed them to programmatically scan for and infect other vulnerable devices residing within the local networks of these compromised proxy endpoints. The majority of devices compromised through Kimwolf’s local network scanning have been identified as unofficial Android TV streaming boxes. These devices, typically built on the Android Open Source Project (AOSP) rather than the official Android TV OS or Play Protect certified Android devices, are often marketed as a one-time purchase solution for accessing pirated video content from popular subscription streaming services.

A significant contributing factor to their vulnerability is that many of these TV boxes ship with residential proxy software pre-installed. Furthermore, they often lack robust security measures or authentication protocols, making them susceptible to compromise if direct communication with the device is possible. While IPIDEA and other affected proxy providers have reportedly implemented measures to block threats like Kimwolf from propagating upstream into their networks, with varying degrees of success, the Kimwolf malware continues to reside on millions of infected devices globally.
The association of Kimwolf with residential proxy networks and compromised Android TV boxes might suggest a limited presence within corporate environments. However, new research from the cybersecurity firm Infoblox paints a starkly different picture. A recent analysis of Infoblox’s customer traffic revealed that nearly 25 percent of their clients made a query to a Kimwolf-related domain name since October 1, 2025, the approximate date of the botnet’s emergence. These affected customers are distributed across the globe and represent a wide spectrum of industry verticals, including education, healthcare, government, and finance. Infoblox clarified that this statistic indicates that nearly a quarter of their customers had at least one device acting as an endpoint for a residential proxy service targeted by Kimwolf operators. Such a device, whether a phone or laptop, was essentially co-opted by threat actors to probe the local network for vulnerable devices. A DNS query signifies that a scan was performed, not necessarily that new devices were successfully compromised. The success of lateral movement would be contingent on the presence of vulnerable devices or the absence of DNS resolution blocking.
Synthient, a startup specializing in tracking proxy services and one of the first to publicly disclose Kimwolf’s unique propagation methods on January 2, 2026, observed an alarming number of IPIDEA proxy endpoints within government and academic institutions worldwide. Synthient’s research identified at least 33,000 affected internet addresses at universities and colleges, and nearly 8,000 IPIDEA proxies operating within various U.S. and foreign government networks.
Further analysis presented in a webinar on January 16, 2026, by experts at the proxy tracking service Spur, examined internet addresses linked to IPIDEA and ten other proxy services believed to be susceptible to Kimwolf’s exploits. Spur’s investigation uncovered residential proxies within approximately 300 government-owned and operated networks, 318 utility companies, 166 healthcare organizations or hospitals, and 141 companies in the banking and finance sectors. Riley Kilmer, Co-Founder of Spur, expressed significant concern over the findings, particularly the presence of IPIDEA and similar proxy services within U.S. Department of Defense (DoD) networks. Kilmer speculated that while these infected devices might be segregated on the network, limiting the immediate impact of local access, the potential for exploitation remains. "If a device goes in, anything that device has access to the proxy would have access to," Kilmer stated, emphasizing the inherent risk.

Kilmer highlighted Kimwolf as a prime example of how a single residential proxy infection can rapidly escalate into substantial problems for organizations that host unsecured devices behind their firewalls. He explained that proxy services offer a deceptively simple avenue for attackers to probe other devices on an organization’s local network. "If you know you have [proxy] infections that are located in a company, you can choose that [network] to come out of and then locally pivot," Kilmer elaborated. "If you have an idea of where to start or look, now you have a foothold in a company or an enterprise based on just that."
This investigation into the Kimwolf botnet marks the third installment in a series of reports. The next article will delve into the intricate connections between China-based individuals and companies and the Badbox 2.0 botnet, a collective term encompassing a vast array of Android TV streaming box models that are shipped with pre-installed residential proxy malware and lack essential security or authentication features.
For further reading on the Kimwolf botnet and related threats, readers are encouraged to consult the following resources:
- "The Kimwolf Botnet is Stalking Your Local Network"
- "Who Benefitted from the Aisuru and Kimwolf Botnets?"
- "A Broken System Fueling Botnets" (Synthient)

