New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
A newly discovered botnet malware called KadNap is targeting ASUS routers and other edge networking devices to turn them into proxies for malicious traffic.
Works for me.The server hosting the malware appears to be offline (or blocked).
labs.cloudsecurityalliance.org
I can tell you, I'm not a huge fan of this either. It gives a lot of power to unwitting home users who typically have no idea about security, complex networking concepts or technology in general. How are they going to know what holes their docker image just opened. I would be in favor of renaming it to the BE19000PB... PB=Pandora's BoxHow do you think "harden the perimeter" interacts with the customer's ability on the BE19000AI's to download unsecured docker containers? Realize it is not the immediate issue, but consider the implications of extending a bare metal home router into unrestrained network utility and application space. Why isn't the community speaking out against what could be a devastatingly irresponsible trend, bad as things may already be.
Don't expose SSH or web admin access to the internet.
"ASUS PROTIP: How to get your router hacked in 3 easy steps!"ASUS routers are regularly targeted, but seems like ASUS see no issue:
[Wireless Router] How to set up ASUS wireless router to access WebGUI/Router App from WAN?
Agreed.ASUS routers are regularly targeted, but seems like ASUS see no issue:
[Wireless Router] How to set up ASUS wireless router to access WebGUI/Router App from WAN?
Agreed.ASUS routers are regularly targeted, but seems like ASUS see no issue:
[Wireless Router] How to set up ASUS wireless router to access WebGUI/Router App from WAN?

Doesn't Skynet have a warning message if these ports are open? I remember seeing it."ASUS PROTIP: How to get your router hacked in 3 easy steps!"
The way things are reporting back on our routers since the introduction of 3006, it seems to be very misleading. When you run an nmap against my WAN IP, you get these results:Doesn't Skynet have a warning message if these ports are open? I remember seeing it.
I should probably add something similar into amtm.
We want the users, the routers and our scripts save, right?
That's not a problem with the router, it's a problem interpreting the results of the test. Testing from the router itself or LAN is not valid because there are firewall rules that allow all traffic from the LAN/router. Just because you're using the WAN address doesn't mean you're testing from the internet side. The same is true for 3004.The way things are reporting back on our routers since the introduction of 3006, it seems to be very misleading. When you run an nmap against my WAN IP, you get these results:
View attachment 70716
View attachment 70717
Even though these ports are not accessible from the outside. I know that the UDP is definitely not accessible/filtered. But the TCP seems very misleading without doing further checks.
It wasn't doing this with 3004. Running nmap against the WAN would yield no results as it should have been. As soon as I loaded 3006, that was the first thing I noticed that it is interpreting this differently.That's not a problem with the router, it's a problem interpreting the results of the test. Testing from the router itself or LAN is not valid because there are firewall rules that allow all traffic from the LAN/router. Just because you're using the WAN address doesn't mean you're testing from the internet side. The same is true for 3004.
I ran the same nmap tests on my router running 3004 and a LAN PC before posting and got the same results as in your post (apart from port 8083 which I don't use). I've run these tests in the past also with the same results. So I don't understand why your past results were different. I also don't understand why you would think you would see no results.It wasn't doing this with 3004. Running nmap against the WAN would yield no results as it should have been. As soon as I loaded 3006, that was the first thing I noticed that it is interpreting this differently.
AT&T (Forged Fiber 37) has acquired substantially all of the residential/small-business fiber in 11 states from Lumen on 02/02/26.Lumen owns my ISP and according to the article has already blocked it. Banned the IP of the script host anyway.
I just tried it against my 3004 router, and you're right. SSH shows as exposed on the WAN. I will have to look through the message history and see exactly when it was that caused this change in the past. Thank you for checking on your end as well.I ran the same nmap tests on my router running 3004 and a LAN PC before posting and got the same results as in your post (apart from port 8083 which I don't use). I've run these tests in the past also with the same results. So I don't understand why your past results were different. I also don't understand why you would think you would see no results.
EDIT: Perhaps you were running something like Skynet that was doing additional blocking? Just a guess.
We use essential cookies to make this site work, and optional cookies to enhance your experience.