An investigation prompted by a social media lead referencing a "botnet war" between Bigpanzi and "Kimsuky" targeting Android TV boxes reveals a critical misattribution. The conflict is between Bigpanzi (Chinese cybercrime syndicate, active since 2015) and Kimwolf/Aisuru (multinational botnet operation, emerged 2025) -- NOT the North Korean state-sponsored APT group Kimsuky (APT43). The name similarity between "Kimwolf" and "Kimsuky" has caused confusion in open-source reporting. These are entirely separate threat actors with no operational overlap.
Our investigation confirmed 5 live Bigpanzi Pandoraspear C2 servers on port 9999, mapped extensive Kimwolf infrastructure including Ethereum Name Service (ENS) resilient C2, and identified the residential proxy supply chain (Resi Rack LLC, IPIDEA, ByteConnect SDK) enabling both botnets to infect over 3.5 million Android TV devices globally.
Key Findings
CRITICAL MISATTRIBUTION: The "Kimsuky" reference in the source tweet almost certainly refers to Kimwolf, a cybercrime botnet. Kimsuky (APT43/Thallium) is a North Korean state-sponsored espionage group that deploys PowerShell backdoors and spearphishing -- NOT IoT botnets. Their TTPs, targeting, and infrastructure are entirely different.
Bigpanzi infrastructure remains LIVE: All 5 known Pandoraspear C2 servers (port 9999) are actively accepting connections as of 2026-04-03.
Kimwolf is the actual competitor: Emerged late 2025, infected 2M+ Android TV devices, launched a 31.4 Tbps DDoS attack, and uses ENS blockchain for resilient C2.
Scale of the Android TV battlefield: Combined, Bigpanzi (~170K daily active), Kimwolf (~1.83M daily active), Vo1d (~1.6M), and BadBox (10M+) represent over 15 million compromised Android TV devices globally.
Supply chain enablers: Resi Rack LLC (Lehi, Utah), IPIDEA residential proxies, ByteConnect SDK (Plainproxies/3XK Tech GmbH) form the proxy monetization pipeline for Kimwolf.
Bigpanzi uses Chinese cloud infrastructure: mf1ve[.]com registered via Alibaba Cloud (HiChina), resolving to Alibaba Cloud LLC IP space.
snarutox[.]com reveals commercial operation: 35+ subdomains with fresh DigiCert certificates (Mar-Apr 2026) including panel, dashboard, payment, and VPN infrastructure -- indicating Bigpanzi operates as a commercial P2P CDN business.
What Was Found vs. What Was Known
Aspect
Prior Reporting
Our Findings
"Kimsuky" involvement
Claimed in social media
DEBUNKED -- Kimwolf, not Kimsuky. Zero overlap.
Bigpanzi C2 status
Documented Jan 2024
5 servers LIVE on port 9999 (Apr 2026)
Botnet conflict
Vague "invisible war"
Shared device population -- same Android TV box models targeted
Kimwolf infrastructure
ENS-based C2 documented
Resi Rack IPs 93.95.112.50-59 dark on Shodan
snarutox.com (Bigpanzi pcdn)
Known C2 domain
35+ subdomains with fresh DigiCert certs (Mar-Apr 2026)
The "Botnet War" -- What Is Actually Happening
The Android TV box ecosystem has become contested territory for multiple independent cybercrime operations:
Bigpanzi (est. 2015, Chinese origin) deploys Pandoraspear backdoor + Pcdn P2P CDN via backdoored firmware and pirated media APKs. Targets Brazil-heavy device fleet.
Kimwolf/Aisuru (est. 2025, multinational) deploys Mirai-derivative DDoS bot + SOCKS proxy via ADB exploitation and residential proxy tunneling. Targets devices in 222 countries.
The "war" is a competition for the same finite pool of vulnerable Android TV devices. When one botnet infects a device, it often kills competing malware processes. This creates an ongoing displacement cycle where botnets fight for dominance on the same hardware.
Infrastructure Analysis
Bigpanzi -- Pandoraspear C2 Servers (LIVE as of 2026-04-03)
This is a fully operational business infrastructure, not just C2 hosting. The Bigpanzi operators are running what appears to be a commercial P2P CDN service monetizing their botnet.
Scale: 2M+ infected devices, 1.83M daily active bots
Key actors: Dort (Canada), Snow (unknown), Forky (Brazil), Shox/Linus (Utah, US), Friedrich Kraft (Germany)
OPSEC: Poor -- real names exposed, Discord indexed by Flashpoint, ENS records public
Kimsuky (APT43) -- NOT INVOLVED
Confidence: DEFINITIVE that Kimsuky is NOT involved in Android TV botnet operations
Evidence: All Kimsuky MalwareBazaar samples are PowerShell/RAR/ZIP (espionage tools). No ELF/APK botnet samples. No IoT targeting documented by CISA, Mandiant, or any CERT.
The name "Kimsuky" in the source tweet is a misidentification of "Kimwolf"
The Battlefield -- Device Population Overlap
The Android TV box ecosystem (~50M+ vulnerable devices globally) is contested by at least four major botnets:
Bigpanzi territory: ~170K daily active (Brazil-heavy), Pandoraspear backdoor + Pcdn P2P CDN, infection via pirated firmware/APKs
Kimwolf territory: ~1.83M daily active (222 countries), Mirai-derivative DDoS + SOCKS proxy, infection via ADB:5555 + residential proxy tunneling
BadBox territory: ~10M+ (supply chain compromise), pre-installed in factory firmware, ad fraud focus
Contested zones exist where devices are infected by multiple botnets simultaneously. Kimwolf + Aisuru have been confirmed coexisting on the same devices (same infection scripts). Bigpanzi + Vo1d have suspected overlap (shared decryption techniques). All botnets target the same cheap Android TV box models (X96Q, MX10, SuperBOX, HiDPTAndroid, etc.).
Recommended Actions
Immediate (24-48 hours)
Block all Bigpanzi C2 IPs and domains listed above at network perimeter
Monitor for connections to port 9999 from Android TV devices
Check for ADB port 5555 exposure on all Android devices
Block ENS resolution for pawsatyou[.]eth
Short-term (1-2 weeks)
Audit all Android TV boxes and streaming devices on the network
Replace cheap off-brand Android TV boxes with Google-certified devices
Disable ADB over network on all Android devices
Implement DNS sinkholing for known C2 domains
Medium-term (1-3 months)
Establish IoT network segmentation (VLAN isolation for media devices)
Deploy network monitoring for unusual P2P traffic patterns (Pcdn)
Monitor Ethereum ENS records for C2 domain updates
Consider residential proxy detection solutions
References
XLab/QianXin: "Bigpanzi Exposed" (Jan 2024)
XLab/QianXin: "Kimwolf Exposed" (Dec 2025)
Krebs on Security: "Who Benefited from the Aisuru and Kimwolf Botnets?" (Jan 2026)
Krebs on Security: "The Kimwolf Botnet is Stalking Your Local Network" (Jan 2026)