{"id":16098,"date":"2026-03-16T16:35:27","date_gmt":"2026-03-16T03:35:27","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=16098"},"modified":"2026-03-16T16:35:27","modified_gmt":"2026-03-16T03:35:27","slug":"your-home-small-business-router-could-be-working-for-criminals-right-now","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=16098","title":{"rendered":"Your (Home\/Small Business) Router Could Be Working for Criminals Right Now"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Right now, somewhere in the world, a home or office router is quietly routing cybercriminal traffic, and its owner is completely unaware.<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">That&#8217;s the reality revealed by the discovery of KadNap, a sophisticated malware campaign that has become one of the most significant cybersecurity stories of 2026.<\/p>\n<h2 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>What Is KadNap?<\/strong><\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Cybersecurity researchers at <a href=\"https:\/\/thehackernews.com\/2026\/03\/kadnap-malware-infects-14000-edge.html\">Black Lotus Labs discovered KadNap<\/a> malware primarily targeting Asus routers, conscripting them into a botnet that proxies malicious traffic. Since August 2025, the network has grown to over 14,000 infected devices, with more than 60% of victims in the United States. Infections have also been confirmed in Australia, the UK, and across Europe.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>There is no reason New Zealand businesses and homes should consider themselves exempt.<\/strong><\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">For the average owner of an infected router, the malware would be essentially undetectable, beyond internet speeds feeling slightly sluggish at times.<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><span class=\"inline-flex\" data-state=\"closed\"><\/span><strong>How Does It Work?<\/strong><\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The infection begins when a targeted device downloads a malicious script that establishes persistence by setting up a scheduled task running every hour. Once assimilated into the botnet, the device&#8217;s internet connection is packaged and sold through a criminal proxy service. <span class=\"inline-flex\" data-state=\"closed\"><\/span><a href=\"https:\/\/cyberpress.org\/kadnap-hits-14000-routers\/\">Buyers use hijacked devices<\/a> to execute brute-force attacks and targeted exploitation campaigns, and because the traffic originates from ordinary home connections, it easily bypasses traditional security filters.\u00a0 Your router becomes the criminals&#8217; cover story.<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>The Password Problem<\/strong><\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Here&#8217;s the uncomfortable truth: many of these infections were entirely preventable. Our advice has long been that the organisations managing routers must ensure devices do not rely on common default passwords, and management interfaces should be properly secured and not accessible via the internet.\u00a0 <span class=\"inline-flex\" data-state=\"closed\"><\/span>Default passwords, such as the ones printed on the bottom of your router, are well known to attackers. They&#8217;re among the first credentials attempted in any automated attack. Changing them takes two minutes.<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Every Business and Home Is a Target<\/strong><\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">KadNap dismantles one of the most dangerous assumptions in cybersecurity: that attackers only go after large organisations or valuable data. A router sitting quietly in a home or small business can now become part of a global criminal network.<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>The target isn&#8217;t your data \u2014 it&#8217;s your device and your IP address as cover for someone else&#8217;s crime.<\/strong><\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">For Kiwi businesses, your router is the gateway to everything: email, financial systems, client data, cloud platforms. A compromised device doesn&#8217;t just expose your own network, it can involve your business in criminal activity.<\/p>\n<h3 class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>What You Should Do Today<\/strong><\/h3>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\">Change default passwords on every router and network device \u2014 at the office and at home<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Update firmware regularly to close known vulnerabilities<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Replace end-of-life devices that no longer receive security updates<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Disable remote management interfaces unless specifically required<\/li>\n<\/ul>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">At Kinetics, our <a href=\"https:\/\/new.kinetics.co.nz\/cybersecurity\/\">KARE Foundation<\/a> service covers exactly this kind of proactive network hygiene \u2014 systematically managing the security tasks that protect your business before problems emerge.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">KadNap is a reminder that cybersecurity starts at the device level, with something as simple as a strong password on your router.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Right now, somewhere in the world, a home or office router is quietly routing cybercriminal traffic, and its owner is completely unaware. That&#8217;s the reality revealed by the discovery of KadNap, a sophisticated malware campaign that has become one of the most significant cybersecurity stories of 2026. What Is KadNap? Cybersecurity researchers at Black Lotus [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":16104,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-16098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16098"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/16098\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}