Linux, IoT backdoor stays stealthy using NKN blockchain The Register

Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol.
NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a traditional blockchain and the Tor network.
More than 60,000 official nodes are active and the network's algorithms determine the optimum route for data exchange across those nodes.
It aims to provide a decentralized alternative to client-to-server methods of data exchange while preserving speed and privacy.
Historically, network protocols like NKN have been used by cybercriminals to establish command and control infrastructure - a means to anonymize the malicious traffic sent between the malware and its operator.
Researchers at Kaspersky say they uncovered NKAbuse while looking into an incident at one of its customers in the finance sector.
NKAbuse apparently exploits an old Apache Struts 2 vulnerability and can target eight different architectures, although Linux appears to be the priority.
The incident saw the attackers use a publicly available proof of concept exploit for the Struts 2 flaw, allowing it to execute a remote shell script and determine the victim's operating system, determining which second-stage payload is installed.
Analyzing an example attack with NKAbuse's amd64 version, after initially being placed in the /tmp directory, the implant checks that it's the only instance running and moves to the system's root, then achieves persistence through the use of cron jobs.
To maximize the reliability of the connection to its operator over NKN, the malware creates a new account and multiclient on the network so that it can send and receive data from multiple clients at once.
NKAbuse comes equipped with 12 different types of DDoS attack, all of which are associated with known botnets, Kaspersky says.
NKAbuse's RAT functionality is broad, with attackers being able to do things like take screenshots of the victim's desktop and send the converted PNG file back to the operator, in addition to running system commands, removing files, and fetching a file list from a specified directory, among other tasks.
Implants have been spotted at victim organizations based in Mexico, Colombia, and Vietnam.


This Cyber News was published on go.theregister.com. Publication date: Fri, 15 Dec 2023 14:43:12 +0000


Cyber News related to Linux, IoT backdoor stays stealthy using NKN blockchain The Register

New NKAbuse malware abuses NKN blockchain for stealthy comms - A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN technology for data exchange, making it a stealthy threat. NKN is a relatively new decentralized peer-to-peer network protocol leveraging blockchain ...
11 months ago Bleepingcomputer.com
Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol - The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities. NKAbuse infiltrates systems by uploading an implant to the victim host. The malware ...
11 months ago Securelist.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
11 months ago Cysecurity.news
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
11 months ago Go.theregister.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
11 months ago Packetstormsecurity.com
Integrating the Power of AI and Blockchain for Data Security and Transparency - In an ever-changing digital landscape, providing strong data security and transparency has become critical. This article explores the dynamic interaction of two transformational technologies: artificial intelligence and blockchain. Artificial ...
10 months ago Cysecurity.news
AI and Blockchain Convergence: A Game Changer in the Digital Sector - AI and blockchain are two of the most revolutionary technologies of our time, and their combination will totally transform the tech sector. The two main axes around which blockchain is conceptualised are cryptocurrencies and the infrastructure ...
11 months ago Cysecurity.news
NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks - A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN for communication. Russian cybersecurity firm Kaspersky detailed the malware's capabilities in a ...
11 months ago Cysecurity.news
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
8 months ago Cisa.gov
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines - A sophisticated and versatile malware called NKAbuse has been discovered operating as both a flooder and a backdoor, targeting Linux desktops in Colombia, Mexico, and Vietnam. According to a report this week from Kaspersky, this cross-platform ...
11 months ago Darkreading.com
NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks - A new multiplatform threat that uses the peer-to-peer NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service attacks to a remote access trojan. The multiple-threat malware, ...
11 months ago Securityboulevard.com
IoT Security: Safeguarding Business IoT Devices - The security of IoT devices is of utmost importance as businesses increasingly rely on them to streamline operations and enhance productivity. In this discussion, we will explore the importance of IoT security in safeguarding business IoT devices and ...
9 months ago Securityzap.com
BianLian GOs for PowerShell After TeamCity Exploitation - In conjunction with GuidePoint's DFIR team, we responded to an incident that began with the exploitation of a TeamCity server which resulted in the deployment of a PowerShell implementation of BianLian's GO backdoor. The threat actor identified a ...
8 months ago Securityboulevard.com
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
8 months ago Cisa.gov
IoT Security for Business: Safeguarding Connected Devices - In this discussion, we will explore the significance of IoT security for businesses and effective strategies for safeguarding connected devices. With the increasing number of connected devices in business environments, the need for effective IoT ...
9 months ago Securityzap.com
The Role of IoT in Modern Education - From smart classrooms equipped with IoT devices to personalized learning platforms, IoT has paved the way for a more immersive and tailored educational experience. Overall, the integration of IoT in education holds great promise in transforming the ...
10 months ago Securityzap.com
IoT Security in the Age of Cyber Threats - These vast neural networks enable IoT devices to seamlessly connect the mundane and the sophisticated into the digital fabric of the internet. This range of devices includes everything right from kitchen appliances and industrial machinery to smart ...
10 months ago Feeds.dzone.com
How To Improve Security Capacities of The Internet of Things? - The security of the Internet of Things is one of the main challenges of today. Many IoT assets could get an easy target to cyber attacks and it's highly recommended to somehow cope with these requirements. The best practice is something that would ...
9 months ago Cyberdefensemagazine.com
NKAbuse Malware Attacking Linux Desktops & Corn Persistence - Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over an extended period. Infiltrating via implant upload, it establishes persistence through a ...
11 months ago Gbhackers.com
Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds - It took two brothers who went to MIT months to plan how they were going to steal, launder and hide millions of dollars in cryptocurrency - and only 12 seconds to actually pull off the heist. The brothers, Anton Peraire-Bueno and James Pepaire-Bueno, ...
6 months ago Securityboulevard.com
Decentralised Identity: The Next Revolution Enabled by Block Chain Technology - Enter decentralised identity, a novel concept aimed at improving data privacy and user empowerment. In this article, we will delve into the world of decentralised identity, describing its principles, important components, and how decentralised ...
8 months ago Cysecurity.news
Somos, Inc. Protects Businesses' IoT Assets With the Availability of SomosID - PRESS RELEASE. EAST BRUNSWICK, N.J., Feb. 14, 2024 /PRNewswire/ - Somos, Inc., an industry expert in identity management, fraudprevention and data services who is recognized as a leading provider of solutions that foster trust in voice and messaging, ...
9 months ago Darkreading.com
Embedded Linux IoT Security: Defending Against Cyber Threats - Embedded Linux IoT systems are now essential parts of many different kinds of products, from industrial machinery and smart appliances to medical equipment and automobile systems. As Embedded Linux is being used widely, it has attracted the attention ...
10 months ago Securityboulevard.com
CVE-2013-0135 - Multiple SQL injection vulnerabilities in PHP Address Book 8.2.5 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) addressbook/register/delete_user.php, (2) addressbook/register/edit_user.php, or (3) ...
7 years ago

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)