Kimwolf IoT Botnet Disrupts I2P Anonymity Network in Massive Sybil Attack

Kimwolf IoT Botnet Disrupts I2P Anonymity Network in Massive Sybil Attack

The massive IoT botnet known as Kimwolf has spent the past week disrupting the Invisible Internet Project (I2P), a decentralized anonymity network, after its operators attempted to join approximately 700,000 infected devices as nodes on the network. The incident represents one of the largest Sybil attacks ever observed against a privacy-focused communications infrastructure.

Source: Krebs I2P users complaining about service disruptions from a rapidly increasing number of routers suddenly swamping the network.

Accidental Takedown

I2P users began reporting disruptions on February 3, with tens of thousands of new routers suddenly overwhelming the network and preventing legitimate users from connecting. One user reported their physical router freezing when connections exceeded 60,000.

The same day, Kimwolf's operators openly acknowledged in their Discord channel that they had accidentally disrupted I2P while attempting to onboard 700,000 bots as network nodes. The I2P network normally consists of between 15,000 and 20,000 devices on any given day, according to Lance James, founder of cybersecurity consultancy Unit 221B and the original founder of I2P.

Source: Krebs A graph shared by I2P developers showing a marked drop in successful connections on the I2P network around the time the Kimwolf botnet started trying to use the network for fallback communications.

The influx was many times the network's total capacity. I2P users reported a rapid increase in new routers that were unable to transmit data, effectively drowning out legitimate traffic in what's known as a Sybil attack — where a single entity disrupts a peer-to-peer network by flooding it with fake, controlled identities.

Seeking Takedown-Resistant C2

The disruption was not intentional. Benjamin Brundage, founder of botnet-tracking startup Synthient and the first to document Kimwolf's spreading techniques, told Krebs on Security that the operators were trying to build command-and-control infrastructure that cannot be easily dismantled.

"I don't think their goal is to take I2P down," Brundage said. "It's more they're looking for an alternative to keep the botnet stable in the face of takedown attempts."

Kimwolf has also been experimenting with the Tor anonymity network as a backup C2 channel, though no widespread Tor disruptions have been reported.

Background

Kimwolf surfaced in late 2025 and quickly infected millions of poorly secured IoT devices — including TV streaming boxes, digital picture frames, and routers — turning them into relays for malicious traffic and large-scale DDoS attacks. The botnet previously caused problems for Cloudflare when it instructed millions of infected devices to use Cloudflare's DNS settings, causing Kimwolf control domains to repeatedly overtake Amazon, Apple, Google, and Microsoft in Cloudflare's public ranking of most-requested websites.

Source: Krebs An I2P user posted this graph on Feb. 10, showing tens of thousands of routers — mostly from the United States — suddenly attempting to join the network.

Botnet in Decline

There may be a silver lining. Brundage noted that Kimwolf's operators have recently alienated some of their more competent developers, leading to a mistake that caused the botnet to lose more than 600,000 infected systems.

"It seems like they're just running experiments in production," he said. "But the botnet's numbers are dropping significantly now, and they don't seem to know what they're doing."

James confirmed that I2P is still operating at roughly half capacity, with a new release rolling out that should bring stability improvements over the coming week.

Recommendation

Organizations should audit IoT device inventories for default credentials and unnecessary network exposure. Monitor for unusual I2P or Tor traffic from internal devices, which may indicate botnet enrollment. Network defenders tracking Kimwolf indicators should note the shift toward anonymity-network-based C2 as a potential evolution in the botnet's infrastructure resilience strategy.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire