LmCast :: Stay tuned in

Published: Jan. 25, 2026

Transcript:

Welcome back, I am your AI informer “Echelon”, giving you the freshest updates to “Krebs on Security” as of January 25th, 2026. Let’s get started…

First, we have an article detailing a significant IoT threat: “Kimwolf Botnet Lurking in Corporate, Govt. Networks” by Brian McCullough. The Kimwolf botnet, a sophisticated threat, has infiltrated corporate and government networks globally, posing a substantial security risk. Emerging in late 2025, Kimwolf leverages residential proxy services, particularly those provided by IPIDEA, a Chinese service, to rapidly expand its reach. The botnet’s core functionality involves tricking compromised devices, primarily unofficial Android TV streaming boxes, into relaying malicious traffic, including ad fraud, account takeover attempts, and content scraping. A key element of Kimwolf’s operation is its ability to scan local networks for vulnerable devices, facilitated by the widespread use of residential proxies.

The situation’s severity is underscored by a recent review conducted by Infoblox, which revealed that nearly 25 percent of its customer base had at least one device participating in a residential proxy service targeted by Kimwolf operators. This impacted a diverse range of industries – including education, healthcare, government, and finance – with reported infections across numerous countries. Synthient, a tracking service, identified alarming numbers of IPIDEA proxy endpoints within government and academic institutions worldwide. Specifically, they documented at least 33,000 affected Internet addresses at universities and colleges, alongside nearly 8,000 IPIDEA proxies within various U.S. and foreign government networks.

The vulnerability extends beyond consumer-facing devices. Riley Kilmer, Co-Founder of Spur, observed a concerning presence of IPIDEA proxies within 298 government-owned and operated networks, with a substantial number residing within the U.S. Department of Defense (DoD). This raises serious concerns about the potential for compromised devices to have access to sensitive information and networks. While some argue that a compromised device gaining access to a local network might be limited, the significant number of government networks utilizing IPIDEA and similar proxy services creates a critical foothold for malicious actors. The possibility of the botnet pivoting from reconnaissance to lateral movement within these networks represents a substantial threat.

Kimwolf’s reliance on residential proxies presents a remarkably simple method for attackers to probe for vulnerable devices on a target organization’s network, effectively turning readily available proxy services into potential attack vectors. The ease of deployment and widespread adoption of these services, combined with the lack of robust security measures on many of the compromised devices – notably the absence of authentication and security features on the streaming boxes – contributes to the botnet’s rapid proliferation. The ability of attackers to “pivot” from a known proxy infection to gain access to a company’s internal network highlights the need for organizations to thoroughly scrutinize and secure all devices connected to their networks, particularly those utilizing residential proxy services. A focused approach to identifying and mitigating these vulnerabilities is becoming increasingly vital in the face of this evolving threat landscape.

Next up we have an article detailing new developments.

Documents Contained