6 min read
6 min read

Security researchers say the KadNap malware campaign has infected more than 14,000 internet edge devices, primarily Asus routers, and enrolled them into a botnet. The operation routes malicious traffic through victims’ connections and has been linked to criminal proxy activity.
Users should install the latest firmware, replace default or weak administrator credentials, and disable unnecessary remote access on affected devices. These steps help reduce the risk of unauthorized control and ongoing abuse of the router.

The widespread router compromise highlights how outdated firmware and unpatched vulnerabilities make devices easy targets. Many users never update their routers, leaving them exposed for months or even years.
Attackers can exploit known security flaws to gain administrative access, redirect internet traffic, or install malicious software. Regular maintenance, such as applying updates and using strong, unique passwords, is critical for keeping network devices secure and preventing large-scale attacks.

Compromised routers don’t just affect individual users. Businesses using the same vulnerable hardware could face data breaches, lost productivity, and reputational damage.
Hackers can turn infected routers into part of botnets, enabling distributed denial of service attacks against other organizations or critical infrastructure.
This type of vulnerability demonstrates that even small devices on a network can pose serious security risks for larger systems and connected users.

Once a router is compromised, attackers can change settings, reroute DNS traffic, or use the device as a proxy to hide malicious activity. Because the router sits between local devices and the internet, a breach can expose the whole network to added risk.
Compromised routers can also be used to redirect people to malicious sites or support follow-on attacks against other targets. That is why router security remains an important first layer of defense for homes and businesses.

Signs of router tampering can include unfamiliar administrator accounts, unrecognized IP addresses, unexpected DNS or port-forwarding changes, and unusual network behavior. In some cases, users may also notice redirects to unfamiliar or fake websites.
Reviewing router settings, checking connected devices, and watching for unauthorized configuration changes can help identify a problem early. Quick action can limit further misuse of the network and reduce the chance of follow-on attacks.

Experts recommend changing default passwords, updating firmware, disabling remote access, and using encryption settings like WPA3. Regularly reviewing connected devices and logging network activity can also help prevent attacks.
For high-risk users or small businesses, investing in modern, security-focused routers provides additional protection. Taking proactive steps ensures routers remain secure against ongoing cyber threats and reduces the likelihood of large-scale compromises.

Router manufacturers help reduce risk by issuing security updates, publishing advisories, and clearly identifying when products have reached end of life. Users and organizations still need to apply those updates promptly and replace unsupported hardware when necessary.
Service providers can also help by sharing security guidance with customers and encouraging timely remediation. Effective protection depends on vendors, providers, and users acting together.

Large-scale router compromises can impact internet traffic, online services, and digital commerce worldwide. Infected devices can be leveraged for coordinated attacks or to manipulate online information.
This highlights the need for consistent security standards and awareness campaigns to educate users about potential threats. Cybersecurity is no longer just a personal concern but a critical element of global digital infrastructure.

This router attack is part of a broader trend of targeting Internet of Things devices. Connected appliances, smart cameras, and home automation systems often have weak security, making them attractive to cybercriminals.
Protecting routers and other connected devices is crucial because they can serve as gateways for attackers to access entire networks. Vigilance and regular updates are key to mitigating these risks.
Fun fact: IoT involves so much data that it is measured in zettabytes, and the first IoT device was a soda machine at Carnegie Mellon, which led to the development of the first widely used IoT device, i.e., ATMs.

For small and medium-sized businesses, compromised routers can lead to theft of customer data, financial loss, and legal liability. Attackers can exploit these weaknesses to gain entry into corporate networks, install malware, or intercept communications.
Maintaining a secure network infrastructure is critical to business continuity and protecting sensitive information from increasingly sophisticated cyber threats.

Government cybersecurity agencies have recently warned about the risks of compromised routers, residential proxy abuse, and unsupported edge devices. Their guidance emphasizes patching supported devices, replacing unsupported ones, and securing administrative access.
Public and private coordination also matters when tracking malicious infrastructure and sharing indicators of compromise. Following established security guidance helps reduce the impact of large-scale router threats.

Experts recommend designing routers with automatic updates, stronger default security, and user-friendly monitoring tools. Security education for consumers and businesses is equally important to reduce the number of vulnerable devices.
By combining hardware improvements, software safeguards, and awareness campaigns, the risk of massive router compromises can be significantly reduced in the coming years.
Concerned about who’s using your internet? Check your network for sneaky connections and take control.

Staying informed about potential threats and acting quickly is essential for network security. Updating firmware, using strong passwords, monitoring traffic, and following cybersecurity guidance can protect home and business networks from attacks.
While hackers continue to exploit weaknesses, proactive measures help ensure devices remain secure and online systems remain resilient against evolving cyber threats.
If your connection suddenly denies access, here’s what you should do when your Wi-Fi locks you out.
How do you stay ahead of cyber threats and protect your devices? Share your tips in the comments and let us know which security measures you find most effective.
This slideshow was made with AI assistance and human editing.
Don’t forget to follow us for more exclusive content right here on MSN.
Read More From This Brand:
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!