Category: Uncategorized

  • Four challenges facing New York City Mayor Zohran Mamdani

    Four challenges facing New York City Mayor Zohran Mamdani


    Getty Images Zohran Mamdani at his inaugurationGetty Images

    Speaking to a cheering crowd of thousands at his inauguration, Mamdani pledged to “govern expansively and audaciously”

    On the first freezing winter day of 2026, surrounded by thousands of cheering New Yorkers and progressive Democratic allies, New York City Mayor Zohran Mamdani pledged to tell a “new story of our city”.

    “City Hall will deliver an agenda of safety, affordability, and abundance – where government looks and lives like the people it represents,” he told the crowd in his inaugural address.

    It was the same message that propelled the 34-year-old Democratic socialist to an unexpected electoral victory in November. His pitch to lead the most expensive US city included big changes, such as universal childcare, free public buses and city-run grocery stores.

    But the mayor is likely to encounter several challenges in trying to deliver on these promises, and he’ll need to keep on board other important political stakeholders – beginning on his first full day in office.

    “He’ll put all of his political and other might behind getting these things accomplished,” said Patrick Egan, a professor of politics and public policy at New York University. But, he said, New York City is “a big place, it’s a complicated place, and so, all bets are off about whether these things can happen or not”.

    1. Paying for policy promises

    Mamdani’s promises

    Mamdani’s lofty policy platform has centred on cost-of-living issues, including freezing rent hikes for subsidised housing units and providing universal free childcare.

    He will be able to accomplish some of his policy goals on his own and without significant expense, government experts said. For instance, if he wants to freeze rents for subsidised housing, he can appoint people aligned with this policy on the city’s rent control board.

    But finding the funding to make other goals a reality when the state and city face budget shortfalls will prove complicated, government experts said.

    “If he wants to provide free bus service and free child care, these kinds of things cost money,” said Robert Shapiro, a professor of international and public affairs at Columbia University. “The big roadblock for the things he’d like to do are the state of the New York, the financial capacity of the state and the political willingness of the governor.”

    Mamdani has said some funding would come from new taxes. He believes taxes on the wealthy could raise as much as $9bn (£6.6bn), with pledges to raise the corporate tax rate from 7.25% to 11.5%.

    But Mamdani needs the support of the state government to make tax changes.

    The more moderate Democratic Governor Kathy Hochul endorsed him in the race last year as well as some of his affordability goals. But Hochul, who is making her own political calculations as she runs for re-election this year, has already indicated she may not support Mamdani’s broader tax plan.

    2. Avoiding White House intervention

    Watch: What Trump and Mamdani have said about each other

    For weeks leading up to the New York City mayoral election, President Donald Trump took to social media and news briefings to attack Mamdani, a rising Democratic star, as a “communist” mayor who threatened the future of the largest US city.

    Trump threatened to withhold billions of federal dollars to the city if Mamdani was elected.

    But the first meeting between the future mayor and the president last November proved much more amicable than expected. The two men frequently smiled at each other and shared praise, with Trump telling Mamdani he was “confident that he can do a very good job”.

    Still, the two politicians’ diametrically opposed policy positions could lead to conflict as Mamdani takes over City Hall. Immigration may be a point of tension.

    For now, New York has not been a target of Trump’s efforts to send in National Guard troops, as he has done in Democratic-led cities across the US in response to anti-immigration protests.

    But the Trump administration did ramp up immigration raids in New York as part of its enforcement efforts in several cities.

    Meanwhile, the mayor pledged in his victory speech that New York would “remain a city of immigrants, a city built by immigrants, powered by immigrants, and … led by an immigrant”.

    3. Getting business leaders on board

    Supporting small businesses

    Mamdani’s shock victory in the New York City Democratic mayoral primary in June sent Wall Street leaders into a frenzy.

    Some business leaders threatened to leave the city, while others spent millions behind the scenes to try to coalesce support around other mayoral candidates.

    But as Mamdani maintained his status as the race frontrunner, some of these attitudes began to shift. The now-mayor reached out to his opponents in the business world to hear their concerns.

    Mamdani pledged to meet with leaders including JPMorgan Chase CEO Jamie Dimon, who later said he would offer his help if Mamdani was elected.

    Mamdani also met with real estate developer Jeffrey Gural, who described him as “personable” and “smart”.

    Still, Gural and others in the business community continue to express their concerns that the 34-year-old lacks the experience to lead the nation’s largest city – and that his plans to raise taxes on corporations and wealthy people will drive some of them to leave New York.

    Mr Egan said it remains to be seen whether a “spirit of cooperation” will persist between business leaders and Mamdani as he forges ahead with an agenda that is ideologically at odds with some of their goals.

    “Any mayor of New York needs cooperation from business leaders, and in particular finance and real estate that play big roles here in New York City,” he said.

    4. Addressing public safety

    A new public safety plan

    As mayor, Mamdani will face a perennial challenge for New York City leaders, tackling crime and maintaining a sense of safety for New Yorkers.

    Like many big cities, New York saw an uptick in crime during the Covid pandemic, though in 2025, the rate of homocides and shootings in the city fell to a near-record low.

    This decline in crime gives Mamdani “a bit of wiggle room to think creatively” about public safety in New York, including improving social services and support, Mr Egan said.

    Mamdani has promised to create a Department of Community Safety that would invest in mental health programmes and crisis response as well as deploy outreach workers to subway stations across the city.

    Outgoing Mayor Eric Adams’ administration also sent outreach workers to subway stations and established other housing and mental health programmes. But some experts and community leaders say those efforts failed to adequately address homelessness and mental health crises.

    Democratic strategist Howard Wolfson, a counselor to former New York City Mayor Mike Bloomberg, said he and others will judge Mamdani first and foremost on how the city is policed, and how shoplifting and quality of life crimes are handled.

    Mamdani won over some business leaders and members of the public with his decision to ask Police Commissioner Jessica Tisch, who served in Adams’ administration, to stay on as police chief.

    “Public safety is really kind of the prerequisite for success or failure,” Mr Wolfson previously told the BBC. “I think if people feel safe here, they can tolerate an awful lot of other challenges. And if they don’t, then there’s not a lot of other challenges that they will be willing to tolerate.”



    Source link

  • From social media trend to economic powerhouse

    From social media trend to economic powerhouse


    Suranjana TewariAsia Business Correspondent, Seoul, South Korea

    Watch: Korean skincare is a multi-billion dollar industry – what makes it so great?

    Who would have thought serums infused with snail mucin – the sticky substance they secrete – would become a part of skincare routines around the world?

    Well, it’s happened – and the gooey elasticity is key, according to a viral TikTok challenge promoting the serum. It made its manufacturer, the small South Korean label CosRX, go global. It is now owned by Amorepacific, the country’s biggest cosmetics company.

    The rapid spread of that sticky serum tells you just how wildly successful K-beauty has become. Fuelled by viral content and trends, it is one of the biggest industries in South Korea, where the pressure to look almost flawless has always been huge in a highly competitive society.

    The domestic market alone was valued at about $13bn (£9.6bn) in 2024, with sales of some products expected to grow at double-digit rates. And the rest of the world is just as obsessed with K-beauty – which is perhaps unsurprising given it’s part of the Hallyu, or Korean Wave, which has made K-Pop and K-dramas a global phenomenon.

    K-beauty brands now occupy whole sections at global retailers – from Sephora to Boots to Walmart. In the first half of 2025, South Korea overtook France, the birthplace of modern cosmetics, to become the world’s second-largest exporter of beauty products, after the United States.

    Search for “Korean skincare” on TikTok, Instagram or YouTube and you’ll be met with a deluge of content from influencers, some of whom have hundreds of millions of followers. They dissect ingredient lists, film unboxings and record “Get Ready With Me” videos built around ideas such as “glass skin”, sheet masks and, of course, snail mucin.

    “There are so many products and brands, and a lot of times you’re exposed to millions of them as a consumer – it’s highly saturated and competitive,” said Liah Yoo, a beauty influencer and founder of the US-based K-beauty brand Krave Beauty.

    The formula behind the rise

    At the heart of K-beauty’s rise is a relentless pace of innovation. New formulations appear every few months, often designed to spark the next online obsession.

    Ten-step skincare routines, overnight “water sleeping masks” and headline-grabbing ingredients such as salmon sperm were once viewed as niche or unappealing. Today, many are staples in bathroom cabinets from London to Los Angeles.

    Social media has been central to this shift. Products launched in Seoul are on TikTok and Instagram feeds in the US, UK, India and Australia instantly.

    There are however growing concerns about the social impact of beauty ideals, particularly on young people. Experts warn that constant exposure to skincare content online can fuel anxiety and excessive spending.

    Getty Images Sulwhasoo brand global ambassador, Yoona of girl group Girls' Generation poses for a photocall for the AMORE PACIFIC 'Sulwhasoo' holistic night party on April 14, 2025 in Seoul,Getty Images

    K-pop star Yoona promoting one of South Korea’s best-known beauty brands

    “We are fully aware that excessive use or misuse of social media can lead to backlash,” said Kim Seung-hwan, Amorepacific’s chief executive, adding that brands must strike a careful balance in how they use online platforms.

    The challenge will only grow as the industry expands to include Western multinationals.

    L’Oréal acquired a South Korean conglomerate which included the brand Dr.G in late 2024, saying the deal would help meet rising demand for effective yet affordable K-beauty products.

    Other global firms are increasingly incorporating popular ingredients associated with Korean brands such as centella asiatica and rice water into their own lines.

    Many of South Korea’s large beauty brands are part of the country’s powerful conglomerates, or chaebols.

    Amorepacific accounts for roughly half of the domestic market. Its portfolio ranges from premium brands such as Sulwhasoo to global mass-market names like Laneige, environmentally focused labels such as Innisfree, and fast-growing independent brands. But even as a chaebol, Amorepacific says it looks to smaller independent brands for fresh ideas.

    Getty Images Influencer Aylen Park and her mother attend Korean beauty event in New York, October 23, 2025.Getty Images

    Influencer Aylen Park and her mother attend a Korean beauty event organised by Amorepacific and Sephora in New York

    “Through the founder and the CosRX team, we were able to learn their approach to formula innovation and how to respond more quickly to consumer needs,” Mr Kim from Amorepacific said. “These lessons have since been integrated into our wider organisation.”

    In 2024, Amorepacific sold about $6.2bn of products. LG Household & Health Care, another major conglomerate, recorded sales of $4.1bn. The scale of the industry continues to show up in South Korea’s export figures too.

    Exports rose 15% in the first half of 2025 to a record $5.5bn, largely driven by strong sales in the US and Europe, putting the country on track to surpass $10bn in annual beauty exports.

    For Mr Kim, all customers are not the same.

    “In countries like Japan, Korea and China, there is more interest in things like flawless skin. In Europe fragrance is the main category, and in the US make-up is more popular,” he said.

    “Things are changing though,” he added, pointing to rising interest among Western consumers in youthful-looking skin and sun protection, particularly as awareness of climate change and UV exposure grows.

    Keeping up with the competition

    To cater to the ever-growing demand, South Korea’s 30,000 or so beauty brands rely on a highly sophisticated industrial ecosystem.

    They are supported by original development manufacturers, or ODMs, which handle research, formulation and production for thousands of labels.

    Getty Images Customers browse Amorepacific Corp. cosmetics at the store in the company's headquarters in Seoul, South Korea, on Wednesday, Sept. 12, 2018.Getty Images

    Amorepacific is South Korea’s biggest cosmetics company

    Even large conglomerates outsource some product lines, while smaller names depend heavily on ODMs to move quickly and keep costs down.

    Cosmax, one of the largest manufacturers, supplies products to about 4,500 brands from factories across South Korea, China, the US and South East Asia.

    In 2024, it accounted for just over a quarter of South Korea’s $10bn worth of cosmetics exports.

    This allows products to move from being conceptualised to being sold in as little as six months – the process that can take one to three years for many Western brands.

    Automation helps keep costs down. The BBC visited a sprawling Amorepacific factory outside South Korea’s capital Seoul, where a handful of workers oversaw fully automated production lines bottling Laneige’s Water Sleeping Mask and CosRX’s Vitamin C 23 Serum.

    Speed, however, comes at a cost. Intense competition has contributed to thin profit margins and high rates of business failures. According to government data, more than 8,800 cosmetics brands have gone out of business in recent years.

    “South Korea has great infrastructure that can help you create a brand quickly, but growing a successful brand is another story,” said Ms Yoo. “It comes down to your brand ethos, your identity, and how different your products are from anything else on the market.”

    As competition intensifies, brands face growing pressure to be more transparent, and to focus on ingredients and the effectiveness of their products rather than celebrity endorsements.

    “We’re not just buying from the big brands now. We’re actually talking about ingredients, where it’s sourced, what it does,” said Mia Chen, a prominent beauty influencer. “A lot of Korean skincare derives from natural ingredients, and we all want that on our skin without side effects.”

    Getty Images Sydney Sweeney visits the LANEIGE Pop-Up at The Grove LA on March 25, 2024 in Los Angeles, CaliforniaGetty Images

    Sydney Sweeney is the global ambassador for Amorepacific’s Laneige brand

    The industry is also being shaped by its changing market.

    China is no longer the biggest overseas buyer as its own brands erode the dominance once enjoyed by Japanese and Korean imports.

    For the first time in 80 years, Amorepacific’s North America business overtook the one in China last year, Mr Kim said, adding that the firm also expects growth in Japan, Europe, India and the Middle East.

    The US remains a key market, importing more beauty products from South Korea than anywhere else. But President Donald Trump’s 15% tariffs on Korean imports have sparked some uncertainty.

    Olive Young, South Korea’s biggest cosmetics retailer which plans to open its first store in the US this year, imposed a 15% customs duty on American orders. Amorepacific said it would consider price increases only on a case-by-case basis, based on discussions with retail partners such as Sephora and Walmart.

    But the firms have the backing of the South Korean government, which designated K-beauty a strategic national asset in December, promising to support manufacturing and exports.

    It is a telling vote of confidence in an industry that kicked off as a viral trend and is now an economic force.

    Additional reporting by Jaltson Akkanath Chummar and Juna Moon



    Source link

  • The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security

    The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security


    The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it’s time for a broader awareness of the threat. The short version is that everything you thought you knew about the security of the internal network behind your Internet router probably is now dangerously out of date.

    The security company Synthient currently sees more than 2 million infected Kimwolf devices distributed globally but with concentrations in Vietnam, Brazil, India, Saudi Arabia, Russia and the United States. Synthient found that two-thirds of the Kimwolf infections are Android TV boxes with no security or authentication built in.

    The past few months have witnessed the explosive growth of a new botnet dubbed Kimwolf, which experts say has infected more than 2 million devices globally. The Kimwolf malware forces compromised systems to relay malicious and abusive Internet traffic — such as ad fraud, account takeover attempts and mass content scraping — and participate in crippling distributed denial-of-service (DDoS) attacks capable of knocking nearly any website offline for days at a time.

    More important than Kimwolf’s staggering size, however, is the diabolical method it uses to spread so quickly: By effectively tunneling back through various “residential proxy” networks and into the local networks of the proxy endpoints, and by further infecting devices that are hidden behind the assumed protection of the user’s firewall and Internet router.

    Residential proxy networks are sold as a way for customers to anonymize and localize their Web traffic to a specific region, and the biggest of these services allow customers to route their traffic through devices in virtually any country or city around the globe.

    The malware that turns an end-user’s Internet connection into a proxy node is often bundled with dodgy mobile apps and games. These residential proxy programs also are commonly installed via unofficial Android TV boxes sold by third-party merchants on popular e-commerce sites like Amazon, BestBuy, Newegg, and Walmart.

    These TV boxes range in price from $40 to $400, are marketed under a dizzying range of no-name brands and model numbers, and frequently are advertised as a way to stream certain types of subscription video content for free. But there’s a hidden cost to this transaction: As we’ll explore in a moment, these TV boxes make up a considerable chunk of the estimated two million systems currently infected with Kimwolf.

    Some of the unsanctioned Android TV boxes that come with residential proxy malware pre-installed. Image: Synthient.

    Kimwolf also is quite good at infecting a range of Internet-connected digital photo frames that likewise are abundant at major e-commerce websites. In November 2025, researchers from Quokka published a report (PDF) detailing serious security issues in Android-based digital picture frames running the Uhale app — including Amazon’s bestselling digital frame as of March 2025.

    There are two major security problems with these photo frames and unofficial Android TV boxes. The first is that a considerable percentage of them come with malware pre-installed, or else require the user to download an unofficial Android App Store and malware in order to use the device for its stated purpose (video content piracy). The most typical of these uninvited guests are small programs that turn the device into a residential proxy node that is resold to others.

    The second big security nightmare with these photo frames and unsanctioned Android TV boxes is that they rely on a handful of Internet-connected microcomputer boards that have no discernible security or authentication requirements built-in. In other words, if you are on the same network as one or more of these devices, you can likely compromise them simultaneously by issuing a single command across the network.

    THERE’S NO PLACE LIKE 127.0.0.1

    The combination of these two security realities came to the fore in October 2025, when an undergraduate computer science student at the Rochester Institute of Technology began closely tracking Kimwolf’s growth, and interacting directly with its apparent creators on a daily basis.

    Benjamin Brundage is the 22-year-old founder of the security firm Synthient, a startup that helps companies detect proxy networks and learn how those networks are being abused. Conducting much of his research into Kimwolf while studying for final exams, Brundage told KrebsOnSecurity in late October 2025 he suspected Kimwolf was a new Android-based variant of Aisuru, a botnet that was incorrectly blamed for a number of record-smashing DDoS attacks last fall.

    Brundage says Kimwolf grew rapidly by abusing a glaring vulnerability in many of the world’s largest residential proxy services. The crux of the weakness, he explained, was that these proxy services weren’t doing enough to prevent their customers from forwarding requests to internal servers of the individual proxy endpoints.

    Most proxy services take basic steps to prevent their paying customers from “going upstream” into the local network of proxy endpoints, by explicitly denying requests for local addresses specified in RFC-1918, including the well-known Network Address Translation (NAT) ranges 10.0.0.0/8, 192.168.0.0/16, and 172.16.0.0/12. These ranges allow multiple devices in a private network to access the Internet using a single public IP address, and if you run any kind of home or office network, your internal address space operates within one or more of these NAT ranges.

    However, Brundage discovered that the people operating Kimwolf had figured out how to talk directly to devices on the internal networks of millions of residential proxy endpoints, simply by changing their Domain Name System (DNS) settings to match those in the RFC-1918 address ranges.

    “It is possible to circumvent existing domain restrictions by using DNS records that point to 192.168.0.1 or 0.0.0.0,” Brundage wrote in a first-of-its-kind security advisory sent to nearly a dozen residential proxy providers in mid-December 2025. “This grants an attacker the ability to send carefully crafted requests to the current device or a device on the local network. This is actively being exploited, with attackers leveraging this functionality to drop malware.”

    As with the digital photo frames mentioned above, many of these residential proxy services run solely on mobile devices that are running some game, VPN or other app with a hidden component that turns the user’s mobile phone into a residential proxy — often without any meaningful consent.

    In a report published today, Synthient said key actors involved in Kimwolf were observed monetizing the botnet through app installs, selling residential proxy bandwidth, and selling its DDoS functionality.

    “Synthient expects to observe a growing interest among threat actors in gaining unrestricted access to proxy networks to infect devices, obtain network access, or access sensitive information,” the report observed. “Kimwolf highlights the risks posed by unsecured proxy networks and their viability as an attack vector.”

    ANDROID DEBUG BRIDGE

    After purchasing a number of unofficial Android TV box models that were most heavily represented in the Kimwolf botnet, Brundage further discovered the proxy service vulnerability was only part of the reason for Kimwolf’s rapid rise: He also found virtually all of the devices he tested were shipped from the factory with a powerful feature called Android Debug Bridge (ADB) mode enabled by default.

    Many of the unofficial Android TV boxes infected by Kimwolf include the ominous disclaimer: “Made in China. Overseas use only.” Image: Synthient.

    ADB is a diagnostic tool intended for use solely during the manufacturing and testing processes, because it allows the devices to be remotely configured and even updated with new (and potentially malicious) firmware. However, shipping these devices with ADB turned on creates a security nightmare because in this state they constantly listen for and accept unauthenticated connection requests.

    For example, opening a command prompt and typing “adb connect” along with a vulnerable device’s (local) IP address followed immediately by “:5555” will very quickly offer unrestricted “super user” administrative access.

    Brundage said by early December, he’d identified a one-to-one overlap between new Kimwolf infections and proxy IP addresses offered for rent by China-based IPIDEA, currently the world’s largest residential proxy network by all accounts.

    “Kimwolf has almost doubled in size this past week, just by exploiting IPIDEA’s proxy pool,” Brundage told KrebsOnSecurity in early December as he was preparing to notify IPIDEA and 10 other proxy providers about his research.

    Brundage said Synthient first confirmed on December 1, 2025 that the Kimwolf botnet operators were tunneling back through IPIDEA’s proxy network and into the local networks of systems running IPIDEA’s proxy software. The attackers dropped the malware payload by directing infected systems to visit a specific Internet address and to call out the pass phrase “krebsfiveheadindustries” in order to unlock the malicious download.

    On December 30, Synthient said it was tracking roughly 2 million IPIDEA addresses exploited by Kimwolf in the previous week. Brundage said he has witnessed Kimwolf rebuilding itself after one recent takedown effort targeting its control servers — from almost nothing to two million infected systems just by tunneling through proxy endpoints on IPIDEA for a couple of days.

    Brundage said IPIDEA has a seemingly inexhaustible supply of new proxies, advertising access to more than 100 million residential proxy endpoints around the globe in the past week alone. Analyzing the exposed devices that were part of IPIDEA’s proxy pool, Synthient said it found more than two-thirds were Android devices that could be compromised with no authentication needed.

    SECURITY NOTIFICATION AND RESPONSE

    After charting a tight overlap in Kimwolf-infected IP addresses and those sold by IPIDEA, Brundage was eager to make his findings public: The vulnerability had clearly been exploited for several months, although it appeared that only a handful of cybercrime actors were aware of the capability. But he also knew that going public without giving vulnerable proxy providers an opportunity to understand and patch it would only lead to more mass abuse of these services by additional cybercriminal groups.

    On December 17, Brundage sent a security notification to all 11 of the apparently affected proxy providers, hoping to give each at least a few weeks to acknowledge and address the core problems identified in his report before he went public. Many proxy providers who received the notification were resellers of IPIDEA that white-labeled the company’s service.

    KrebsOnSecurity first sought comment from IPIDEA in October 2025, in reporting on a story about how the proxy network appeared to have benefitted from the rise of the Aisuru botnet, whose administrators appeared to shift from using the botnet primarily for DDoS attacks to simply installing IPIDEA’s proxy program, among others.

    On December 25, KrebsOnSecurity received an email from an IPIDEA employee identified only as “Oliver,” who said allegations that IPIDEA had benefitted from Aisuru’s rise were baseless.

    “After comprehensively verifying IP traceability records and supplier cooperation agreements, we found no association between any of our IP resources and the Aisuru botnet, nor have we received any notifications from authoritative institutions regarding our IPs being involved in malicious activities,” Oliver wrote. “In addition, for external cooperation, we implement a three-level review mechanism for suppliers, covering qualification verification, resource legality authentication and continuous dynamic monitoring, to ensure no compliance risks throughout the entire cooperation process.”

    “IPIDEA firmly opposes all forms of unfair competition and malicious smearing in the industry, always participates in market competition with compliant operation and honest cooperation, and also calls on the entire industry to jointly abandon irregular and unethical behaviors and build a clean and fair market ecosystem,” Oliver continued.

    Meanwhile, the same day that Oliver’s email arrived, Brundage shared a response he’d just received from IPIDEA’s security officer, who identified himself only by the first name Byron. The security officer said IPIDEA had made a number of important security changes to its residential proxy service to address the vulnerability identified in Brundage’s report.

    “By design, the proxy service does not allow access to any internal or local address space,” Byron explained. “This issue was traced to a legacy module used solely for testing and debugging purposes, which did not fully inherit the internal network access restrictions. Under specific conditions, this module could be abused to reach internal resources. The affected paths have now been fully blocked and the module has been taken offline.”

    Byron told Brundage IPIDEA also instituted multiple mitigations for blocking DNS resolution to internal (NAT) IP ranges, and that it was now blocking proxy endpoints from forwarding traffic on “high-risk” ports “to prevent abuse of the service for scanning, lateral movement, or access to internal services.”

    An excerpt from an email sent by IPIDEA’s security officer in response to Brundage’s vulnerability notification. Click to enlarge.

    Brundage said IPIDEA appears to have successfully patched the vulnerabilities he identified. He also noted he never observed the Kimwolf actors targeting proxy services other than IPIDEA, which has not responded to requests for comment.

    Riley Kilmer is founder of Spur.us, a technology firm that helps companies identify and filter out proxy traffic. Kilmer said Spur has tested Brundage’s findings and confirmed that IPIDEA and all of its affiliate resellers indeed allowed full and unfiltered access to the local LAN.

    Kilmer said one model of unsanctioned Android TV boxes that is especially popular — the Superbox, which we profiled in November’s Is Your Android TV Streaming Box Part of a Botnet? — leaves Android Debug Mode running on localhost:5555.

    “And since Superbox turns the IP into an IPIDEA proxy, a bad actor just has to use the proxy to localhost on that port and install whatever bad SDKs [software development kits] they want,” Kilmer told KrebsOnSecurity.

    Superbox media streaming boxes for sale on Walmart.com.

    ECHOES FROM THE PAST

    Both Brundage and Kilmer say IPIDEA appears to be the second or third reincarnation of a residential proxy network formerly known as 911S5 Proxy, a service that operated between 2014 and 2022 and was wildly popular on cybercrime forums. 911S5 Proxy imploded a week after KrebsOnSecurity published a deep dive on the service’s sketchy origins and leadership in China.

    In that 2022 profile, we cited work by researchers at the University of Sherbrooke in Canada who were studying the threat 911S5 could pose to internal corporate networks. The researchers noted that “the infection of a node enables the 911S5 user to access shared resources on the network such as local intranet portals or other services.”

    “It also enables the end user to probe the LAN network of the infected node,” the researchers explained. “Using the internal router, it would be possible to poison the DNS cache of the LAN router of the infected node, enabling further attacks.”

    911S5 initially responded to our reporting in 2022 by claiming it was conducting a top-down security review of the service. But the proxy service abruptly closed up shop just one week later, saying a malicious hacker had destroyed all of the company’s customer and payment records. In July 2024, The U.S. Department of the Treasury sanctioned the alleged creators of 911S5, and the U.S. Department of Justice arrested the Chinese national named in my 2022 profile of the proxy service.

    Kilmer said IPIDEA also operates a sister service called 922 Proxy, which the company has pitched from Day One as a seamless alternative to 911S5 Proxy.

    “You cannot tell me they don’t want the 911 customers by calling it that,” Kilmer said.

    Among the recipients of Synthient’s notification was the proxy giant Oxylabs. Brundage shared an email he received from Oxylabs’ security team on December 31, which acknowledged Oxylabs had started rolling out security modifications to address the vulnerabilities described in Synthient’s report.

    Reached for comment, Oxylabs confirmed they “have implemented changes that now eliminate the ability to bypass the blocklist and forward requests to private network addresses using a controlled domain,” the company said in a written statement. But it said there is no evidence that Kimwolf or other other attackers exploited its network.

    “In parallel, we reviewed the domains identified in the reported exploitation activity and did not observe traffic associated with them,” the Oxylabs statement continued. “Based on this review, there is no indication that our residential network was impacted by these activities.”

    PRACTICAL IMPLICATIONS

    Consider the following scenario, in which the mere act of allowing someone to use your Wi-Fi network could lead to a Kimwolf botnet infection. In this example, a friend or family member comes to stay with you for a few days, and you grant them access to your Wi-Fi without knowing that their mobile phone is infected with an app that turns the device into a residential proxy node. At that point, your home’s public IP address will show up for rent at the website of some residential proxy provider.

    Miscreants like those behind Kimwolf then use residential proxy services online to access that proxy node on your IP, tunnel back through it and into your local area network (LAN), and automatically scan the internal network for devices with Android Debug Bridge mode turned on.

    By the time your guest has packed up their things, said their goodbyes and disconnected from your Wi-Fi, you now have two devices on your local network — a digital photo frame and an unsanctioned Android TV box — that are infected with Kimwolf. You may have never intended for these devices to be exposed to the larger Internet, and yet there you are.

    Here’s another possible nightmare scenario: Attackers use their access to proxy networks to modify your Internet router’s settings so that it relies on malicious DNS servers controlled by the attackers — allowing them to control where your Web browser goes when it requests a website. Think that’s far-fetched? Recall the DNSChanger malware from 2012 that infected more than a half-million routers with search-hijacking malware, and ultimately spawned an entire security industry working group focused on containing and eradicating it.

    XLAB

    Much of what is published so far on Kimwolf has come from the Chinese security firm XLab, which was the first to chronicle the rise of the Aisuru botnet in late 2024. In its latest blog post, XLab said it began tracking Kimwolf on October 24, when the botnet’s control servers were swamping Cloudflare’s DNS servers with lookups for the distinctive domain 14emeliaterracewestroxburyma02132[.]su.

    This domain and others connected to early Kimwolf variants spent several weeks topping Cloudflare’s chart of the Internet’s most sought-after domains, edging out Google.com and Apple.com of their rightful spots in the top 5 most-requested domains. That’s because during that time Kimwolf was asking its millions of bots to check in frequently using Cloudflare’s DNS servers.

    The Chinese security firm XLab found the Kimwolf botnet had enslaved between 1.8 and 2 million devices, with heavy concentrations in Brazil, India, The United States of America and Argentina. Image: blog.xLab.qianxin.com

    It is clear from reading the XLab report that KrebsOnSecurity (and security experts) probably erred in misattributing some of Kimwolf’s early activities to the Aisuru botnet, which appears to be operated by a different group entirely. IPDEA may have been truthful when it said it had no affiliation with the Aisuru botnet, but Brundage’s data left no doubt that its proxy service clearly was being massively abused by Aisuru’s Android variant, Kimwolf.

    XLab said Kimwolf has infected at least 1.8 million devices, and has shown it is able to rebuild itself quickly from scratch.

    “Analysis indicates that Kimwolf’s primary infection targets are TV boxes deployed in residential network environments,” XLab researchers wrote. “Since residential networks usually adopt dynamic IP allocation mechanisms, the public IPs of devices change over time, so the true scale of infected devices cannot be accurately measured solely by the quantity of IPs. In other words, the cumulative observation of 2.7 million IP addresses does not equate to 2.7 million infected devices.”

    XLab said measuring Kimwolf’s size also is difficult because infected devices are distributed across multiple global time zones. “Affected by time zone differences and usage habits (e.g., turning off devices at night, not using TV boxes during holidays, etc.), these devices are not online simultaneously, further increasing the difficulty of comprehensive observation through a single time window,” the blog post observed.

    XLab noted that the Kimwolf author “shows an almost ‘obsessive’ fixation on Yours Truly, apparently leaving “easter eggs” related to my name in multiple places through the botnet’s code and communications:

    Image: XLAB.

    ANALYSIS AND ADVICE

    One frustrating aspect of threats like Kimwolf is that in most cases it is not easy for the average user to determine if there are any devices on their internal network which may be vulnerable to threats like Kimwolf and/or already infected with residential proxy malware.

    Let’s assume that through years of security training or some dark magic you can successfully identify that residential proxy activity on your internal network was linked to a specific mobile device inside your house: From there, you’d still need to isolate and remove the app or unwanted component that is turning the device into a residential proxy.

    Also, the tooling and knowledge needed to achieve this kind of visibility just isn’t there from an average consumer standpoint. The work that it takes to configure your network so you can see and interpret logs of all traffic coming in and out is largely beyond the skillset of most Internet users (and, I’d wager, many security experts). But it’s a topic worth exploring in an upcoming story.

    Happily, Synthient has erected a page on its website that will state whether a visitor’s public Internet address was seen among those of Kimwolf-infected systems. Brundage also has compiled a list of the unofficial Android TV boxes that are most highly represented in the Kimwolf botnet.

    If you own a TV box that matches one of these model names and/or numbers, please just rip it out of your network. If you encounter one of these devices on the network of a family member or friend, send them a link to this story and explain that it’s not worth the potential hassle and harm created by keeping them plugged in.

    The top 15 product devices represented in the Kimwolf botnet, according to Synthient.

    Chad Seaman is a principal security researcher with Akamai Technologies. Seaman said he wants more consumers to be wary of these pseudo Android TV boxes to the point where they avoid them altogether.

    “I want the consumer to be paranoid of these crappy devices and of these residential proxy schemes,” he said. “We need to highlight why they’re dangerous to everyone and to the individual. The whole security model where people think their LAN (Local Internal Network) is safe, that there aren’t any bad guys on the LAN so it can’t be that dangerous is just really outdated now.”

    “The idea that an app can enable this type of abuse on my network and other networks, that should really give you pause,” about which devices to allow onto your local network, Seaman said. “And it’s not just Android devices here. Some of these proxy services have SDKs for Mac and Windows, and the iPhone. It could be running something that inadvertently cracks open your network and lets countless random people inside.”

    In July 2025, Google filed a “John Doe” lawsuit (PDF) against 25 unidentified defendants collectively dubbed the “BadBox 2.0 Enterprise,” which Google described as a botnet of over ten million unsanctioned Android streaming devices engaged in advertising fraud. Google said the BADBOX 2.0 botnet, in addition to compromising multiple types of devices prior to purchase, also can infect devices by requiring the download of malicious apps from unofficial marketplaces.

    Google’s lawsuit came on the heels of a June 2025 advisory from the Federal Bureau of Investigation (FBI), which warned that cyber criminals were gaining unauthorized access to home networks by either configuring the products with malware prior to the user’s purchase, or infecting the device as it downloads required applications that contain backdoors — usually during the set-up process.

    The FBI said BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. The original BADBOX was identified in 2023, and primarily consisted of Android operating system devices that were compromised with backdoor malware prior to purchase.

    Lindsay Kaye is vice president of threat intelligence at HUMAN Security, a company that worked closely on the BADBOX investigations. Kaye said the BADBOX botnets and the residential proxy networks that rode on top of compromised devices were detected because they enabled a ridiculous amount of advertising fraud, as well as ticket scalping, retail fraud, account takeovers and content scraping.

    Kaye said consumers should stick to known brands when it comes to purchasing things that require a wired or wireless connection.

    “If people are asking what they can do to avoid being victimized by proxies, it’s safest to stick with name brands,” Kaye said. “Anything promising something for free or low-cost, or giving you something for nothing just isn’t worth it. And be careful about what apps you allow on your phone.”

    Many wireless routers these days make it relatively easy to deploy a “Guest” wireless network on-the-fly. Doing so allows your guests to browse the Internet just fine but it blocks their device from being able to talk to other devices on the local network — such as shared folders, printers and drives. If someone — a friend, family member, or contractor — requests access to your network, give them the guest Wi-Fi network credentials if you have that option.

    There is a small but vocal pro-piracy camp that is almost condescendingly dismissive of the security threats posed by these unsanctioned Android TV boxes. These tech purists positively chafe at the idea of people wholesale discarding one of these TV boxes. A common refrain from this camp is that Internet-connected devices are not inherently bad or good, and that even factory-infected boxes can be flashed with new firmware or custom ROMs that contain no known dodgy software.

    However, it’s important to point out that the majority of people buying these devices are not security or hardware experts; the devices are sought out because they dangle something of value for “free.” Most buyers have no idea of the bargain they’re making when plugging one of these dodgy TV boxes into their network.

    It is somewhat remarkable that we haven’t yet seen the entertainment industry applying more visible pressure on the major e-commerce vendors to stop peddling this insecure and actively malicious hardware that is largely made and marketed for video piracy. These TV boxes are a public nuisance for bundling malicious software while having no apparent security or authentication built-in, and these two qualities make them an attractive nuisance for cybercriminals.

    Stay tuned for Part II in this series, which will poke through clues left behind by the people who appear to have built Kimwolf and benefited from it the most.



    Source link