Close Menu
    Latest Post

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 2026

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    • GHD Speed Hair Dryer Review: Powerful Performance and User-Friendly Design
    • An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years
    • The Next Next Job, a framework for making big career decisions
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Uncovering the Beneficiaries of the Aisuru and Kimwolf Botnets
    Security

    Uncovering the Beneficiaries of the Aisuru and Kimwolf Botnets

    Samuel AlejandroBy Samuel AlejandroFebruary 6, 2026No Comments9 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 1d1n8vz featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A recent report detailed how the destructive Kimwolf botnet infected over two million devices by compromising numerous unofficial Android TV streaming boxes. This article examines the digital evidence left by the hackers, network operators, and services that appear to have profited from Kimwolf’s proliferation.

    XLab, a Chinese security firm, published a detailed analysis of Kimwolf on December 17, 2025. The botnet forces infected devices to participate in distributed denial-of-service (DDoS) attacks and to relay abusive and malicious Internet traffic for residential proxy services.

    Residential proxy software is often discreetly bundled with mobile apps and games. Kimwolf specifically targeted such software pre-installed on over a thousand different models of unauthorized Android TV streaming devices. Once infected, a device’s Internet address quickly begins funneling traffic associated with ad fraud, account takeover attempts, and mass content scraping.

    The XLab report presented “definitive evidence” that the same cybercriminal actors and infrastructure were responsible for deploying both Kimwolf and the earlier Aisuru botnet, which also enslaved devices for DDoS attacks and proxy services.

    XLab had suspected since October that Kimwolf and Aisuru shared the same authors and operators, partly due to common code changes. These suspicions were confirmed on December 8 when both botnet strains were observed being distributed from the same Internet address: 93.95.112[.]59.

    Image 1

    Image: XLab.

    RESI RACK

    Public records indicate that the Internet address range identified by XLab belongs to Lehi, Utah-based Resi Rack LLC. Resi Rack’s website describes the company as a “Premium Game Server Hosting Provider.” However, its advertisements on the Internet moneymaking forum BlackHatWorld refer to it as a “Premium Residential Proxy Hosting and Proxy Software Solutions Company.”

    Resi Rack co-founder Cassidy Hales stated that his company received a notification on December 10 regarding Kimwolf’s use of their network, detailing activities by one of their server-leasing customers. Hales indicated that the issue was addressed immediately and expressed disappointment that their company name was associated with such activities.

    The Resi Rack Internet address mentioned by XLab on December 8 had been on the radar of security researchers for over two weeks prior. Benjamin Brundage, founder of Synthient, a startup tracking proxy services, revealed in late October 2025 that individuals selling proxy services benefiting from the Aisuru and Kimwolf botnets were operating from a new Discord server called resi[.]to.

    Image 2

    On November 24, 2025, a member of the resi-dot-to Discord channel shares an IP address responsible for proxying traffic over Android TV streaming boxes infected by the Kimwolf botnet.

    When researchers joined the resi[.]to Discord channel in late October as silent observers, the server had fewer than 150 members. These included “Shox,” the nickname used by Resi Rack’s co-founder Hales, and his business partner “Linus,” who did not respond to inquiries.

    Other members of the resi[.]to Discord channel periodically posted new IP addresses responsible for proxying traffic via the Kimwolf botnet. As an image from resi[.]to shows, the Resi Rack Internet address flagged by XLab was used by Kimwolf to direct proxy traffic as early as November 24, or possibly earlier. Synthient tracked at least seven static Resi Rack IP addresses linked to Kimwolf proxy infrastructure between October and December 2025.

    Neither of Resi Rack’s co-owners provided responses to follow-up questions. Both had been actively selling proxy services through Discord for nearly two years. According to a review of Discord messages indexed by the cyber intelligence firm Flashpoint, Shox and Linus spent much of 2024 selling static “ISP proxies” by routing various Internet address blocks at major U.S. Internet service providers.

    In February 2025, AT&T announced that, effective July 31, 2025, it would no longer originate routes for network blocks not owned and managed by AT&T, a policy change later adopted by other major ISPs. Less than a month after this announcement, Shox and Linus informed customers that they would soon cease offering static ISP proxies due to these policy changes.

    Image 3

    Shox and Linux, talking about their decision to stop selling ISP proxies.

    DORT & SNOW

    The individual listed as the owner of the resi[.]to Discord server used the abbreviated username “D.,” which appears to be short for the hacker handle “Dort,” a name frequently mentioned in these Discord chats.

    Image 4

    Dort’s profile on resi dot to.

    The “Dort” nickname emerged in recent discussions with “Forky,” a Brazilian man who admitted involvement in marketing the Aisuru botnet during its late 2024 inception. However, Forky strongly denied any connection to a series of massive DDoS attacks in the latter half of 2025 attributed to Aisuru, claiming the botnet had by then been taken over by rivals.

    Forky claims that Dort, a Canadian resident, is one of at least two individuals currently controlling the Aisuru/Kimwolf botnet. The other individual Forky identified as an Aisuru/Kimwolf botmaster uses the nickname “Snow.”

    On January 2, hours after a story on Kimwolf was published, the historical chat records on resi[.]to were abruptly erased and replaced by a profanity-laced message directed at Synthient’s founder. Minutes later, the entire server disappeared.

    Later that day, several active members of the now-defunct resi[.]to Discord server migrated to a Telegram channel. There, they posted Brundage’s personal information and generally expressed frustration about the difficulty of finding reliable “bulletproof” hosting for their botnet.

    A user named “Richard Remington” briefly appeared in the group’s Telegram server, posting a crude “Happy New Year” sketch claiming Dort and Snow now control 3.5 million devices infected by Aisuru and/or Kimwolf. Richard Remington’s Telegram account has since been deleted, but it previously indicated its owner operates a website catering to DDoS-for-hire or “stresser” services for testing their capabilities.

    Image 5

    BYTECONNECT, PLAINPROXIES, AND 3XK TECH

    Both Synthient and XLab reports indicated that Kimwolf was utilized to deploy programs that transformed infected systems into Internet traffic relays for multiple residential proxy services. This included a component that installed a software development kit (SDK) called ByteConnect, distributed by a provider known as Plainproxies.

    ByteConnect claims to specialize in “monetizing apps ethically and free,” while Plainproxies advertises its ability to supply content scraping companies with “unlimited” proxy pools. However, Synthient reported that upon connecting to ByteConnect’s SDK, they observed a significant increase in credential-stuffing attacks targeting email servers and popular online websites.

    LinkedIn profiles show Friedrich Kraft as the CEO of Plainproxies and co-founder of ByteConnect Ltd. Public Internet routing records also link Kraft to 3XK Tech GmbH, a hosting firm in Germany. Kraft did not respond to multiple interview requests.

    In July 2025, Cloudflare identified 3XK Tech (also known as Drei-K-Tech) as the Internet’s largest source of application-layer DDoS attacks. By November 2025, security firm GreyNoise Intelligence found that Internet addresses on 3XK Tech were responsible for approximately three-quarters of the Internet scanning for a newly discovered critical vulnerability in Palo Alto Networks security products.

    Image 6

    Source: Cloudflare’s Q2 2025 DDoS threat report.

    A LinkedIn profile for Julia Levi, another Plainproxies employee, lists her as co-founder of ByteConnect. Levi did not respond to requests for comment. Her resume indicates previous employment with two major proxy providers: Netnut Proxy Network and Bright Data.

    Synthient also reported that Plainproxies ignored their outreach, noting that the Byteconnect SDK remains active on devices compromised by Kimwolf.

    Image 7

    A post from the LinkedIn page of Plainproxies Chief Revenue Officer Julia Levi, explaining how the residential proxy business works.

    MASKIFY

    Synthient’s January 2 report identified Maskify as another proxy provider significantly involved in selling Kimwolf proxies. Maskify currently advertises on multiple cybercrime forums, claiming to offer over six million residential Internet addresses for rent.

    Maskify prices its service at 30 cents per gigabyte of data relayed through its proxies, a rate considered exceptionally low and significantly cheaper than other current proxy providers.

    Synthient’s Research Team obtained screenshots from other proxy providers showing key Kimwolf actors attempting to sell off proxy bandwidth for upfront cash. This approach likely supported early development, with associated members funding infrastructure and outsourced development tasks. Resellers are aware of the nature of their offerings; proxies at these prices are not ethically sourced.

    Maskify did not respond to inquiries.

    Image 8

    The Maskify website. Image: Synthient.

    BOTMASTERS LASH OUT

    Hours after an initial story on Kimwolf was published last week, the resi[.]to Discord server disappeared, Synthient’s website was subjected to a DDoS attack, and the Kimwolf botmasters began doxing Brundage via their botnet.

    The harassing messages were uploaded as text records to the Ethereum Name Service (ENS), a decentralized system supporting smart contracts on the Ethereum blockchain. As documented by XLab, in mid-December, Kimwolf operators upgraded their infrastructure to use ENS, aiming to better withstand constant takedown attempts targeting the botnet’s control servers.

    Image 9

    An ENS record used by the Kimwolf operators taunts security firms trying to take down the botnet’s control servers. Image: XLab.

    By instructing infected systems to locate Kimwolf control servers via ENS, attackers can simply update the ENS text record with a new Internet address for the control server if the current servers are taken down. Infected devices will then immediately know where to find further instructions.

    XLab noted, “This channel itself relies on the decentralized nature of blockchain, unregulated by Ethereum or other blockchain operators, and cannot be blocked.”

    The text records within Kimwolf’s ENS instructions can also contain short messages, such as those that carried Brundage’s personal information. Other ENS text records associated with Kimwolf offered a stark warning: “If flagged, we encourage the TV box to be destroyed.”

    Image 10

    An ENS record tied to the Kimwolf botnet advises, “If flagged, we encourage the TV box to be destroyed.”

    Both Synthient and XLab report that Kimwolf targets numerous Android TV streaming box models, all lacking security protections, with many shipping with pre-installed proxy malware. Generally, if a data packet can be sent to one of these devices, administrative control can be seized.

    If a TV box matches one of the identified model names or numbers, it is advisable to remove it from the network. If such a device is encountered on a family member’s or friend’s network, sharing this information (or a previous story on Kimwolf) can help explain the potential risks and harm of keeping them connected.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article9 Practical Insights from JoulesLabs CEO Arifur Rahman Naim
    Next Article Acer Nitro 18 AI Gaming Laptop Review: Great Value, But With Caveats
    Samuel Alejandro

    Related Posts

    Security

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026
    Security

    An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

    February 21, 2026
    Security

    Anthropic Introduces Embedded Security Scanning for Claude AI

    February 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202513 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202511 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 20260 Views

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 20260 Views

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 20260 Views
    Recent Posts
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.