NKAbuse Malware Attacking Linux Desktops & Corn Persistence

Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over an extended period.
Infiltrating via implant upload, it establishes persistence through a cron job in the home folder, featuring:-.
NKN is a decentralized protocol prioritizing privacy, with more than 60,000 nodes.
Featuring diverse routing algorithms, it optimizes data transmission.
Malware exploits like theuse of NKN's blockchain protocol enable flooding attacks and Linux system backdoors.
GERT finds evidence indicating a Struts2 exploit in an attack on a financial firm.
The malware supports eight architectures, and here below, we have mentioned them:-.
Malware NKAbuse, when executed, relocates to /root/.
It employs NKN protocol for communication, creating an account, and multiclient for concurrent data exchange.
According to researchers, NKAbuse is not just a DDoS tool but also a highly capable backdoor/RAT that offers various features for maintaining persistence, executing commands, and gathering sensitive information.
Its ability to operate as a backdoor and remotely control infected systems makes it a serious threat to cybersecurity.
NKAbuse is a unique cross-platform threat that stands out for its use of uncommon communication protocols.
Crafted for botnet integration, it doubles as a host-specific backdoor.


This Cyber News was published on gbhackers.com. Publication date: Mon, 18 Dec 2023 03:43:04 +0000


Cyber News related to NKAbuse Malware Attacking Linux Desktops & Corn Persistence

Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol - The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities. NKAbuse infiltrates systems by uploading an implant to the victim host. The malware ...
6 months ago Securelist.com
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines - A sophisticated and versatile malware called NKAbuse has been discovered operating as both a flooder and a backdoor, targeting Linux desktops in Colombia, Mexico, and Vietnam. According to a report this week from Kaspersky, this cross-platform ...
6 months ago Darkreading.com
New NKAbuse malware abuses NKN blockchain for stealthy comms - A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN technology for data exchange, making it a stealthy threat. NKN is a relatively new decentralized peer-to-peer network protocol leveraging blockchain ...
6 months ago Bleepingcomputer.com
The Virtual Desktop Revolution: Redefining Work an - A virtual desktop, also referred to as a virtual desktop infrastructure, is a virtualized computing environment that enables users to remotely access and control their desktops from any device with an internet connection. A user who logs in is given ...
6 months ago Feeds.dzone.com
NKAbuse Malware Attacking Linux Desktops & Corn Persistence - Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over an extended period. Infiltrating via implant upload, it establishes persistence through a ...
6 months ago Gbhackers.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 week ago
NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks - A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN for communication. Russian cybersecurity firm Kaspersky detailed the malware's capabilities in a ...
6 months ago Cysecurity.news
NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks - A new multiplatform threat that uses the peer-to-peer NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service attacks to a remote access trojan. The multiple-threat malware, ...
6 months ago Securityboulevard.com
Any.RUN Sandbox Now Expanded to Analyze Linux Malware - The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and secure environment for malware analysis and threat hunting. ANY.RUN allows malware analysts, SOC members, and DFIR team members ...
5 months ago Gbhackers.com
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
3 months ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
3 months ago Cisa.gov
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 week ago Pandasecurity.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
6 months ago Go.theregister.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
6 months ago Packetstormsecurity.com
PixPirate: The Brazilian financial malware you can't see, part one - The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan malware that heavily utilizes anti-research techniques. Within IBM Trusteer, we saw several different ...
5 months ago Securityintelligence.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
2 months ago Pandasecurity.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
How to Extract Malware Configurations in a Sandbox - The most sought-after source of these indicators is malware configurations. Malware Sandboxing Leader ANY.RUN handles the heavy lifting of phishing and malware analysis for SOC and DFIR teams and also helps 300,000 professionals use the platform to ...
4 months ago Gbhackers.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 month ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)