A sophisticated and rapidly expanding Internet-of-Things (IoT) botnet, codenamed Kimwolf, has infiltrated over two million devices, weaponizing them for massive distributed denial-of-service (DDoS) attacks and the relaying of various illicit internet traffic. Its alarming ability to scan compromised local networks for additional IoT devices to infect poses a significant and sobering threat to organizations worldwide. Recent, in-depth research has revealed a surprisingly high prevalence of Kimwolf within sensitive government and corporate networks, raising serious concerns about the security posture of these critical institutions.
The rapid growth of Kimwolf, particularly in the latter months of 2025, can be attributed to its cunning exploitation of "residential proxy" services. These services, often marketed as tools for anonymizing and localizing web traffic to specific geographical regions, allow users to route their internet activity through a vast network of devices across the globe. Kimwolf operators discovered a critical vulnerability: they could forward malicious commands to devices connected to these proxy endpoints. This allowed them to programmatically scan and infect other vulnerable devices within the local network of each compromised proxy.
The malware responsible for co-opting devices into this proxy network is frequently bundled surreptitiously with mobile applications and games. Once installed, it compels the infected device to act as a relay for a range of malicious activities. These include ad fraud, attempts to take over user accounts, and large-scale content scraping, effectively turning unsuspecting users’ devices into tools for cybercrime.
A primary target for Kimwolf’s operations has been the Chinese residential proxy service, IPIDEA. This service boasts millions of proxy endpoints available for rent on any given week, providing a vast and fertile ground for the botnet’s expansion. The operators of Kimwolf, by successfully compromising IPIDEA’s proxy endpoints, gained the ability to probe and infect devices on the internal networks of these endpoints. This lateral movement capability is a key factor in the botnet’s widespread reach.

The majority of systems compromised through Kimwolf’s local network scanning have been identified as unofficial Android TV streaming boxes. These devices, often based on the Android Open Source Project rather than the more secure Android TV OS or Play Protect certified devices, are typically marketed as a one-time purchase solution for accessing pirated content from popular subscription streaming services. The inherent insecurity of these devices is a significant contributing factor to their widespread compromise. Many of these TV boxes are shipped to consumers with residential proxy software pre-installed, and critically, they often lack any robust security or authentication mechanisms. This means that any entity capable of communicating directly with the TV box can easily compromise it with malware.
While IPIDEA and other affected proxy providers have reportedly taken steps to mitigate threats like Kimwolf by blocking upstream access to their endpoints, the Kimwolf malware itself remains resident on millions of already infected devices, continuing to pose a persistent threat.
Despite the common association of Kimwolf with residential proxy networks and compromised Android TV boxes, which might suggest limited impact on corporate networks, the reality has proven to be far more concerning. Security firm Infoblox reported that a recent review of its customer traffic revealed a staggering statistic: nearly 25 percent of their customers made a query to a Kimwolf-related domain name since October 1, 2025, the approximate date of the botnet’s emergence.
Infoblox’s analysis indicated that these affected customers are distributed globally and span a wide array of industry verticals, including education, healthcare, government, and finance. "To be clear, this suggests that nearly 25% of customers had at least one device that was an endpoint in a residential proxy service targeted by Kimwolf operators," Infoblox explained. "Such a device, maybe a phone or a laptop, was essentially co-opted by the threat actor to probe the local network for vulnerable devices. A query means a scan was made, not that new devices were compromised. Lateral movement would fail if there were no vulnerable devices to be found or if the DNS resolution was blocked." This highlights that while the initial detection is a scan, the potential for compromise is significant.
Synthient, a startup specializing in tracking proxy services and one of the first to publicly disclose Kimwolf’s unique propagation methods on January 2, 2026, observed an alarming presence of IPIDEA proxy endpoints within government and academic institutions globally. Synthient’s research uncovered at least 33,000 affected internet addresses at universities and colleges, and nearly 8,000 IPIDEA proxies located within various U.S. and foreign government networks. This presence within such sensitive environments is a stark indicator of the botnet’s reach.

Further analysis conducted by the proxy tracking service Spur, in a webinar on January 16, 2026, identified internet addresses associated with IPIDEA and ten other proxy services that were believed to be vulnerable to Kimwolf’s techniques. Spur’s findings were particularly alarming, revealing residential proxies within nearly 300 government-owned and operated networks, 318 utility companies, 166 healthcare companies or hospitals, and 141 companies in the banking and finance sectors.
Riley Kilmer, Co-Founder of Spur, expressed significant concern over the presence of these compromised services within critical infrastructure. "I looked at the 298 [government] owned and operated [networks], and so many of them were DoD [U.S. Department of Defense], which is kind of terrifying that DoD has IPIDEA and these other proxy services located inside of it," Kilmer stated. "I don’t know how these enterprises have these networks set up. It could be that [infected devices] are segregated on the network, that even if you had local access it doesn’t really mean much. However, it’s something to be aware of. If a device goes in, anything that device has access to the proxy would have access to." This underscores the potential for cascading failures if compromised devices are not adequately isolated.
Kilmer further elaborated on the implications of Kimwolf, emphasizing how a single residential proxy infection can rapidly escalate into major security breaches for organizations that harbor unsecured devices behind their firewalls. Proxy services, he noted, offer attackers a seemingly simple and effective method to probe other devices within an organization’s local network. "If you know you have [proxy] infections that are located in a company, you can choose that [network] to come out of and then locally pivot," Kilmer explained. "If you have an idea of where to start or look, now you have a foothold in a company or an enterprise based on just that." This highlights the strategic advantage Kimwolf offers to threat actors seeking to gain initial access and conduct further reconnaissance.
This investigation into the Kimwolf botnet is part of an ongoing series. The subsequent installment, scheduled for release next week, will delve into the intricate connections between China-based individuals and companies and the Badbox 2.0 botnet. Badbox 2.0 is the collective designation for a vast array of Android TV streaming box models that are notoriously shipped with no discernible security or authentication measures and often come with residential proxy malware pre-installed, further illuminating the systemic issues fueling the proliferation of such botnets.
Further Reading:
- The Kimwolf Botnet is Stalking Your Local Network
- Who Benefitted from the Aisuru and Kimwolf Botnets?
- A Broken System Fueling Botnets (Synthient)

