If your cheap Android TV box feels slower than usual, it might be busy launching DDoS attacks for someone else. Researchers have uncovered KimWolf, a massive botnet that has quietly enslaved over 1.8 million Android TV devices, turning living room entertainment centers into a powerful cyber-weapon.
This isn’t just another Mirai knockoff. KimWolf is sophisticated, resilient, and aggressively monetized.
The infection vector is devastatingly simple. The malware masquerades as a legitimate system application named “Google Play Protect” (package name: com.google.android.hosting). To the average user, seeing this app run in the background looks completely normal—comforting, even. In reality, it’s a wolf in sheep’s clothing.
Once installed, usually via malicious third-party streaming apps or drive-by downloads, the device joins a global army. Researchers at Qianxin Xlabs estimate the botnet has issued over 1.7 billion DDoS attack requests, flooding targets with traffic from unsuspecting users’ homes.
What makes KimWolf particularly annoying for defenders is its use of the Ethereum Name Service (ENS). Instead of using traditional domains that authorities can seize or block, the botnet communicates with .eth domains (specifically kimwolf.eth) to resolve its Command and Control (C2) servers.
You can’t just “take down” a domain on the blockchain. This decentralized infrastructure makes the botnet incredibly resistant to standard takedown efforts.
“KimProxy”: Selling Your Bandwidth
The operators aren’t just using these devices for DDoS attacks; they’re renting them out. The botnet powers a service called KimProxy, which sells access to “residential proxies.”
Cybercriminals love residential proxies because traffic routed through them looks like it’s coming from a regular home internet connection (yours, specifically). This allows them to:
- Bypass geographical restrictions
- Commit ad fraud
- Launch credential stuffing attacks without triggering security alarms
It’s a classic case of proxyjacking—your device and your electricity are being used to facilitate other crimes, and you’re footing the bill.
Are You Infected?
The malware targets Android-based TV boxes, many of which are inexpensive generic models that may not receive regular security updates. If you have one of these devices:
- Check your installed apps for anything suspicious, particularly duplicate “Google” apps or system tools you don’t recognize.
- Monitor your network traffic for unusual spikes effectively turning your home into a proxy node.
- Consider a factory reset if the device behaves erratically.
It’s a stark reminder that in the world of cheap IoT devices, if you aren’t paying for the product, you might just be the product—or in this case, the weapon.

