New NKAbuse malware abuses NKN blockchain for stealthy comms

A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN technology for data exchange, making it a stealthy threat.
NKN is a relatively new decentralized peer-to-peer network protocol leveraging blockchain technology to manage resources and maintain a secure and transparent model for network operations.
One of the goals of NKN is to optimize data transmission speed and latency across the network, which is achievable by calculating efficient data packet travel paths.
Individuals can participate in the NKN network by running nodes, similar to the Tor network, and currently, there are approximately 60,710 nodes in it.
This relatively large number of nodes contributes to robustness, decentralization, and ability to handle significantly high volumes of data.
Kaspersky reports the discovery of a novel malware named NKAbuse, which primarily targets Linux desktops in Mexico, Colombia, and Vietnam.
One NKAbuse infection spotted by Kaspersky involves the exploitation of an old Apache Struts flaw to attack a financial company.
Although most attacks target Linux computers, the malware can compromise IoTs and supports MIPS, ARM, and 386 architectures.
NKAbuse abuses NKN to launch DDoS attacks that are hard to trace back to a specific infrastructure and unlikely to be flagged due to originating from a novel protocol not actively monitored by most security tools.
Specifically, the malware client communicates with the bot master through NKN to send and receive data.
At the same time, its ability to keep multiple concurrent channels alive gives resilience to its communication line.
The payload commands sent by the C2 include HTTP, TCP, UDP, PING, ICMP, and SSL flood attacks aimed at a specified target.
In addition to the DDoS capabilities, NKAbuse also acts as a remote access trojan on compromised systems, allowing its operators to perform command execution, data exfiltration, and snap screenshots.
This plethora of capabilities that make NKAbuse highly versatile and adaptive isn't typical in the DDoS botnet space.
Using blockchain technology that guarantees availability and obfuscates the source of the attacks makes defending against this threat very challenging.
Krasue RAT malware hides on Linux servers using embedded rootkits.
Ten new Android banking trojans targeted 985 bank apps in 2023.
Stealthy KV-botnet hijacks SOHO routers and VPN devices.
Lazarus hackers drop new RAT malware using 2-year-old Log4j bug.
Cold storage giant Americold discloses data breach after April malware attack.


This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 14 Dec 2023 22:15:26 +0000


Cyber News related to New NKAbuse malware abuses NKN blockchain for stealthy comms

New NKAbuse malware abuses NKN blockchain for stealthy comms - A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN technology for data exchange, making it a stealthy threat. NKN is a relatively new decentralized peer-to-peer network protocol leveraging blockchain ...
6 months ago Bleepingcomputer.com
Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol - The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities. NKAbuse infiltrates systems by uploading an implant to the victim host. The malware ...
6 months ago Securelist.com
NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks - A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN for communication. Russian cybersecurity firm Kaspersky detailed the malware's capabilities in a ...
6 months ago Cysecurity.news
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines - A sophisticated and versatile malware called NKAbuse has been discovered operating as both a flooder and a backdoor, targeting Linux desktops in Colombia, Mexico, and Vietnam. According to a report this week from Kaspersky, this cross-platform ...
6 months ago Darkreading.com
NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks - A new multiplatform threat that uses the peer-to-peer NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service attacks to a remote access trojan. The multiple-threat malware, ...
6 months ago Securityboulevard.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
6 months ago Go.theregister.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
6 months ago Packetstormsecurity.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
7 months ago Cysecurity.news
Qbot malware returns in campaign targeting hospitality industry - The QakBot malware is once again being distributed in phishing campaigns after the botnet was disrupted by law enforcement over the summer. In August, a multinational law enforcement operation called Operation Duck Hunt accessed the QakBot admin's ...
6 months ago Bleepingcomputer.com
AI and Blockchain Convergence: A Game Changer in the Digital Sector - AI and blockchain are two of the most revolutionary technologies of our time, and their combination will totally transform the tech sector. The two main axes around which blockchain is conceptualised are cryptocurrencies and the infrastructure ...
6 months ago Cysecurity.news
NKAbuse Malware Attacking Linux Desktops & Corn Persistence - Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over an extended period. Infiltrating via implant upload, it establishes persistence through a ...
6 months ago Gbhackers.com
Integrating the Power of AI and Blockchain for Data Security and Transparency - In an ever-changing digital landscape, providing strong data security and transparency has become critical. This article explores the dynamic interaction of two transformational technologies: artificial intelligence and blockchain. Artificial ...
5 months ago Cysecurity.news
FBI seizes Warzone RAT infrastructure, arrests malware vendor - The FBI dismantled the Warzone RAT malware operation, seizing infrastructure and arresting two individuals associated with the cybercrime operation. Daniel Meli, 27, a resident of Malta, was arrested last week for his role in the proliferation of ...
4 months ago Bleepingcomputer.com
PixPirate: The Brazilian financial malware you can't see, part one - The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan malware that heavily utilizes anti-research techniques. Within IBM Trusteer, we saw several different ...
5 months ago Securityintelligence.com
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 week ago Pandasecurity.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
2 months ago Pandasecurity.com
Blockchain dev's wallet emptied in "job interview" using npm package - The recruiter in question asked the developer to download npm packages from a GitHub repository, and hours later the developer discovered his MetaMask wallet had been emptied. Take-home job exercise empties dev's crypto wallet. Moments later, the ...
6 months ago Bleepingcomputer.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
How to Extract Malware Configurations in a Sandbox - The most sought-after source of these indicators is malware configurations. Malware Sandboxing Leader ANY.RUN handles the heavy lifting of phishing and malware analysis for SOC and DFIR teams and also helps 300,000 professionals use the platform to ...
5 months ago Gbhackers.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)