You are here

Feed aggregator

Can underage people drink alcohol with their parents at restaurants in Ohio?

News Channel 4 - Fri, 01/09/2026 - 04:30
COLUMBUS, Ohio (WCMH) – While the legal drinking age in Ohio is 21, there are certain circumstances where an underage person is permitted to consume alcohol.  In Ohio, it is generally illegal for people under the age of 21 to buy, possess, or consume alcohol. Under state law, doing so is a third-degree misdemeanor, which [...]
Categories: Ohio News

Paris, NBC4's Puppy with a Purpose, set to graduate, become full-time service dog

News Channel 4 - Fri, 01/09/2026 - 04:00
NEW ALBANY, Ohio (WCMH) – Paris, NBC4’s most recent Puppy with a Purpose, is getting ready for the last, and most important, part of his journey. The nearly two-month-old puppy who first came to NBC4 in April 2024 is days away from graduating from professional training with Canine Companions to become a service dog. Paris entered [...]
Categories: Ohio News

Targeted ICE operation in Ohio lasted one week, with 280 arrested

News Channel 4 - Fri, 01/09/2026 - 03:30
COLUMBUS, Ohio (WCMH) -- Federal immigration officers arrested more than 280 immigrants in Ohio between Dec. 16 and 21, officials announced Thursday. The arrests were the result of "Operation Buckeye," Immigration and Customs Enforcement's targeted enforcement operation conducted in Columbus and around Ohio. The announcement comes one day after Columbus residents protested local ICE operations [...]
Categories: Ohio News

Anti-ICE protest return to Downtown Columbus

News Channel 4 - Thu, 01/08/2026 - 21:11
COLUMBUS, Ohio (WCMH) -- Protesters returned to the statehouse Thursday night for the second consecutive night, reacting to the deadly shooting in Minneapolis involving United States Immigration and Customs Enforcement agents. While demonstrators voiced anger and grief, Columbus Police Chief Elaine Bryant said the department does not and has not worked with ICE. "We do [...]
Categories: Ohio News

Worthington fire department puts old building to good use

News Channel 4 - Thu, 01/08/2026 - 18:30
WORTHINGTON, Ohio (WCMH) — Before it's demolished, the former locker room and lifeguard building by Thomas Worthington High School is serving a final, important purpose. The Worthington Division of Fire has been using the building for training. “The building’s going away, and it's provided a lot of enjoyment and recreation and yeah, on its last [...]
Categories: Ohio News

Firearms experts address the safety of Worthington deer culling

News Channel 4 - Thu, 01/08/2026 - 17:30
COLUMBUS, Ohio (WCMH) -- Many residents in Worthington have made their concerns heard about sharpshooters coming to neighborhoods to reduce the deer population. The operation started one week ago and is set to last until the end of February. NBC4 spoke with a firearms expert about residents’ concerns. “We're talking about shooting guns inside of [...]
Categories: Ohio News

New Columbus school board president discusses goals, plans for 2026

News Channel 4 - Thu, 01/08/2026 - 17:00
COLUMBUS, Ohio (WCMH) -- Three new Columbus Board of Education members were sworn in Tuesday night. One of them, Dr. Antoinette Miranda, was elected president of the board on her first day. After serving on the state Board of Education for eight years, Miranda said she was ready to take on the challenge of leading [...]
Categories: Ohio News

High radon levels present in new Franklin County Sheriff's office building

News Channel 4 - Thu, 01/08/2026 - 16:30
COLUMBUS, Ohio (WCMH) -- A report obtained by NBC4 Investigates shows very high levels of a cancer-causing gas in a building where the Franklin County Sheriff's office is moving. It is a move that has been years in the making but is now raising concerns from some county employees who are contacting NBC4 Investigates. The [...]
Categories: Ohio News

Who Benefited from the Aisuru and Kimwolf Botnets?

Krebs on Security - Thu, 01/08/2026 - 16:23

Our first story of 2026 revealed how a destructive new botnet called Kimwolf has infected more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we’ll dig through digital clues left behind by the hackers, network operators and services that appear to have benefitted from Kimwolf’s spread.

On Dec. 17, 2025, the Chinese security firm XLab published a deep dive on Kimwolf, which forces infected devices to participate in distributed denial-of-service (DDoS) attacks and to relay abusive and malicious Internet traffic for so-called “residential proxy” services.

The software that turns one’s device into a residential proxy is often quietly bundled with mobile apps and games. Kimwolf specifically targeted residential proxy software that is factory installed on more than a thousand different models of unsanctioned Android TV streaming devices. Very quickly, the residential proxy’s Internet address starts funneling traffic that is linked to ad fraud, account takeover attempts and mass content scraping.

The XLab report explained its researchers found “definitive evidence” that the same cybercriminal actors and infrastructure were used to deploy both Kimwolf and the Aisuru botnet — an earlier version of Kimwolf that also enslaved devices for use in DDoS attacks and proxy services.

XLab said it suspected since October that Kimwolf and Aisuru had the same author(s) and operators, based in part on shared code changes over time. But it said those suspicions were confirmed on December 8 when it witnessed both botnet strains being distributed by the same Internet address at 93.95.112[.]59.

Image: XLab.

RESI RACK

Public records show the Internet address range flagged by XLab is assigned to Lehi, Utah-based Resi Rack LLC. Resi Rack’s website bills the company as a “Premium Game Server Hosting Provider.” Meanwhile, Resi Rack’s ads on the Internet moneymaking forum BlackHatWorld refer to it as a “Premium Residential Proxy Hosting and Proxy Software Solutions Company.”

Resi Rack co-founder Cassidy Hales told KrebsOnSecurity his company received a notification on December 10 about Kimwolf using their network “that detailed what was being done by one of our customers leasing our servers.”

“When we received this email we took care of this issue immediately,” Hales wrote in response to an email requesting comment. “This is something we are very disappointed is now associated with our name and this was not the intention of our company whatsoever.”

The Resi Rack Internet address cited by XLab on December 8 came onto KrebsOnSecurity’s radar more than two weeks before that. Benjamin Brundage is founder of Synthient, a startup that tracks proxy services. In late October 2025, Brundage shared that the people selling various proxy services which benefitted from the Aisuru and Kimwolf botnets were doing so at a new Discord server called resi[.]to.

On November 24, 2025, a member of the resi-dot-to Discord channel shares an IP address responsible for proxying traffic over Android TV streaming boxes infected by the Kimwolf botnet.

When KrebsOnSecurity joined the resi[.]to Discord channel in late October as a silent lurker, the server had fewer than 150 members, including “Shox” — the nickname used by Resi Rack’s co-founder Mr. Hales — and his business partner “Linus,” who did not respond to requests for comment.

Other members of the resi[.]to Discord channel would periodically post new IP addresses that were responsible for proxying traffic over the Kimwolf botnet. As the screenshot from resi[.]to above shows, that Resi Rack Internet address flagged by XLab was used by Kimwolf to direct proxy traffic as far back as November 24, if not earlier. All told, Synthient said it tracked at least seven static Resi Rack IP addresses connected to Kimwolf proxy infrastructure between October and December 2025.

Neither of Resi Rack’s co-owners responded to follow-up questions. Both have been active in selling proxy services via Discord for nearly two years. According to a review of Discord messages indexed by the cyber intelligence firm Flashpoint, Shox and Linus spent much of 2024 selling static “ISP proxies” by routing various Internet address blocks at major U.S. Internet service providers.

In February 2025, AT&T announced that effective July 31, 2025, it would no longer originate routes for network blocks that are not owned and managed by AT&T (other major ISPs have since made similar moves). Less than a month later, Shox and Linus told customers they would soon cease offering static ISP proxies as a result of these policy changes.

Shox and Linux, talking about their decision to stop selling ISP proxies.

DORT & SNOW

The stated owner of the resi[.]to Discord server went by the abbreviated username “D.” That initial appears to be short for the hacker handle “Dort,” a name that was invoked frequently throughout these Discord chats.

Dort’s profile on resi dot to.

This “Dort” nickname came up in KrebsOnSecurity’s recent conversations with “Forky,” a Brazilian man who acknowledged being involved in the marketing of the Aisuru botnet at its inception in late 2024. But Forky vehemently denied having anything to do with a series of massive and record-smashing DDoS attacks in the latter half of 2025 that were blamed on Aisuru, saying the botnet by that point had been taken over by rivals.

Forky asserts that Dort is a resident of Canada and one of at least two individuals currently in control of the Aisuru/Kimwolf botnet. The other individual Forky named as an Aisuru/Kimwolf botmaster goes by the nickname “Snow.”

On January 2 — just hours after our story on Kimwolf was published — the historical chat records on resi[.]to were erased without warning and replaced by a profanity-laced message for Synthient’s founder. Minutes after that, the entire server disappeared.

Later that same day, several of the more active members of the now-defunct resi[.]to Discord server moved to a Telegram channel where they posted Brundage’s personal information, and generally complained about being unable to find reliable “bulletproof” hosting for their botnet.

Hilariously, a user by the name “Richard Remington” briefly appeared in the group’s Telegram server to post a crude “Happy New Year” sketch that claims Dort and Snow are now in control of 3.5 million devices infected by Aisuru and/or Kimwolf. Richard Remington’s Telegram account has since been deleted, but it previously stated its owner operates a website that caters to DDoS-for-hire or “stresser” services seeking to test their firepower.

BYTECONNECT, PLAINPROXIES, AND 3XK TECH

Reports from both Synthient and XLab found that Kimwolf was used to deploy programs that turned infected systems into Internet traffic relays for multiple residential proxy services. Among those was a component that installed a software development kit (SDK) called ByteConnect, which is distributed by a provider known as Plainproxies.

ByteConnect says it specializes in “monetizing apps ethically and free,” while Plainproxies advertises the ability to provide content scraping companies with “unlimited” proxy pools. However, Synthient said that upon connecting to ByteConnect’s SDK they instead observed a mass influx of credential-stuffing attacks targeting email servers and popular online websites.

A search on LinkedIn finds the CEO of Plainproxies is Friedrich Kraft, whose resume says he is co-founder of ByteConnect Ltd. Public Internet routing records show Mr. Kraft also operates a hosting firm in Germany called 3XK Tech GmbH. Mr. Kraft did not respond to repeated requests for an interview.

In July 2025, Cloudflare reported that 3XK Tech (a.k.a. Drei-K-Tech) had become the Internet’s largest source of application-layer DDoS attacks. In November 2025, the security firm GreyNoise Intelligence found that Internet addresses on 3XK Tech were responsible for roughly three-quarters of the Internet scanning being done at the time for a newly discovered and critical vulnerability in security products made by Palo Alto Networks.

Source: Cloudflare’s Q2 2025 DDoS threat report.

LinkedIn has a profile for another Plainproxies employee, Julia Levi, who is listed as co-founder of ByteConnect. Ms. Levi did not respond to requests for comment. Her resume says she previously worked for two major proxy providers: Netnut Proxy Network, and Bright Data.

Synthient likewise said Plainproxies ignored their outreach, noting that the Byteconnect SDK continues to remain active on devices compromised by Kimwolf.

MASKIFY

Synthient’s January 2 report said another proxy provider heavily involved in the sale of Kimwolf proxies was Maskify, which currently advertises on multiple cybercrime forums that it has more than six million residential Internet addresses for rent.

Maskify prices its service at a rate of 30 cents per gigabyte of data relayed through their proxies. According to Synthient, that price range is insanely low and is far cheaper than any other proxy provider in business today.

“Synthient’s Research Team received screenshots from other proxy providers showing key Kimwolf actors attempting to offload proxy bandwidth in exchange for upfront cash,” the Synthient report noted. “This approach likely helped fuel early development, with associated members spending earnings on infrastructure and outsourced development tasks. Please note that resellers know precisely what they are selling; proxies at these prices are not ethically sourced.”

Maskify did not respond to requests for comment.

The Maskify website. Image: Synthient.

BOTMASTERS LASH OUT

Hours after our first Kimwolf story was published last week, the resi[.]to Discord server vanished, Synthient’s website was hit with a DDoS attack, and the Kimwolf botmasters took to doxing Brundage via their botnet.

The harassing messages appeared as text records uploaded to the Ethereum Name Service (ENS), a distributed system for supporting smart contracts deployed on the Ethereum blockchain. As documented by XLab, in mid-December the Kimwolf operators upgraded their infrastructure and began using ENS to better withstand the near-constant takedown efforts targeting the botnet’s control servers.

An ENS record used by the Kimwolf operators taunts security firms trying to take down the botnet’s control servers. Image: XLab.

By telling infected systems to seek out the Kimwolf control servers via ENS, even if the servers that the botmasters use to control the botnet are taken down the attacker only needs to update the ENS text record to reflect the new Internet address of the control server, and the infected devices will immediately know where to look for further instructions.

“This channel itself relies on the decentralized nature of blockchain, unregulated by Ethereum or other blockchain operators, and cannot be blocked,” XLab wrote.

The text records included in Kimwolf’s ENS instructions can also feature short messages, such as those that carried Brundage’s personal information. Other ENS text records associated with Kimwolf offered some sage advice: “If flagged, we encourage the TV box to be destroyed.”

An ENS record tied to the Kimwolf botnet advises, “If flagged, we encourage the TV box to be destroyed.”

Both Synthient and XLabs say Kimwolf targets a vast number of Android TV streaming box models, all of which have zero security protections, and many of which ship with proxy malware built in. Generally speaking, if you can send a data packet to one of these devices you can also seize administrative control over it.

If you own a TV box that matches one of these model names and/or numbers, please just rip it out of your network. If you encounter one of these devices on the network of a family member or friend, send them a link to this story (or to our January 2 story on Kimwolf) and explain that it’s not worth the potential hassle and harm created by keeping them plugged in.

Categories: Technology, Virus Info

How 'internet sleuths' can impact criminal investigations

News Channel 4 - Thu, 01/08/2026 - 16:00
COLUMBUS, Ohio (WCMH) -- A little more than a week after a local dentist and his wife were found shot dead inside their home, Columbus Police have still not named a suspect. Columbus Police Chief Elaine Bryant spoke about the murders of Spencer and Monique Tepe for the first time Thursday. The chief said they [...]
Categories: Ohio News

Ours Brothers' Keepers expanding services for underserved young people

News Channel 4 - Thu, 01/08/2026 - 15:00
COLUMBUS, Ohio (WCMH) -- One local organization is working to provide a haven for young people throughout Columbus. The group Ours Brothers' Keepers shared that it is extending its reach and uplifting more underserved young people. "They are very thankful, and I'm in learning they are a community in itself,” Ours Brothers Keepers Director Wesley Moore said. "You [...]
Categories: Ohio News

Buckeyes linebacker Arvell Reese declares for the NFL Draft

News Channel 4 - Thu, 01/08/2026 - 14:53
COLUMBUS, Ohio (WCMH) -- Ohio State linebacker Arvell Reese has declared for the NFL Draft and is projected to be a top ten pick in April. The Buckeyes star announced on his Instagram page his intention to forgo his senior season and enter the draft, which takes place from April 23-25 in Pittsburgh. "I want [...]
Categories: Ohio News

One critical in North Linden shooting

News Channel 4 - Thu, 01/08/2026 - 14:14
COLUMBUS, Ohio (WCMH) -- One person was critically injured after a shooting Thursday afternoon in the Columbus neighborhood of North Linden. A Columbus police spokesperson said officers went to the 1200 block of East Hudson Street just after 3:45 p.m. on reports of a shooting. One person was taken to a hospital in critical condition, [...]
Categories: Ohio News

Former Ohio State cornerback Marshon Lattimore arrested on weapons charge

News Channel 4 - Thu, 01/08/2026 - 12:38
LAKEWOOD, Ohio (WCMH) -- Former Ohio State and current Washington Commanders cornerback Marshon Lattimore was arrested in Lakewood and is facing a weapons charge. A spokesperson with the Lakewood police department told NBC4 that Lattimore was a passenger in a vehicle that was stopped by police for having expired plates and committing other traffic violations. [...]
Categories: Ohio News

Northwest Columbus fatal shooting suspects claim self defense, victim identified

News Channel 4 - Thu, 01/08/2026 - 11:59
COLUMBUS, Ohio (WCMH) — A person fatally shot Monday night in the northwest section of Columbus has been identified and police say the suspects claimed self-defense during the incident. According to a CPD media report, officers arrived at the 2900 block of Hayden Road and found 20-year-old Kenneth Grace unresponsive and suffering from a gunshot [...]
Categories: Ohio News

Pages

Subscribe to Some Place in Ohio aggregator