NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks

A new multiplatform threat that uses the peer-to-peer NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service attacks to a remote access trojan.
The multiple-threat malware, dubbed NKAbuse, appears to be targeting Linux desktops, though it also can infect Arm and MIPS systems, which makes it a threat to Internet of Things devices, according to researchers with Kaspersky's Global Emergency Response Team.
Cron job is a Linux command that's sued to schedule tasks that will be executed in the future.
If the current user ID on the system is 0, it parses the current crontab and adds itself for every reboot.
NKN was launched in 2018 as a blockchain-based P2P network connectivity protocol that aims to motivate internet users via economic incentives to share network connections and utilize unused bandwidth, according to the company.
NKN boasts of being the largest blockchain network in the world, with 63,642 nodes.
Kaspersky's GERT noted that it prioritizes decentralization and privacy, with algorithms designed to optimized data transition by selecting the shortest node trajectory for reaching its intended destination.
They said that in one case, the malware exploited a six-year-old vulnerability related to Apache Struts2 to attack a financial company they didn't name.
The malware is installed on the target's system through a remote shell script that downloads and executes the implant that is hosted remotely by the attacker.
The malware checks the operating system on the device before downloading the implant.
The server hosting NKAbuse includes eight chip architectures that the malware can support, including i386, two Arm platforms, amd64, and four MIPS architectures - mips, mipsel, mips64, and mips64el.
The malware contains 10 DDoS attacks with different flooding payloads that can be used at the same time.
NKAbuse also comes is a range of backdoor capabilities, with most of the message commands used for keeping persistence in the infected system, executing commands, or gathering information.
The malware talks to the bot master at regular intervals and can store information about the host devices, including the process identifier, the victim's IP address, free memory available, and its current configuration.
It also can take screenshots of the what's on the display, then convert it to a PNG and send it to the bot master.
It will create files with specific content, remote files, and fetch a file list from a specific path, get a list of processes the system is running and a detailed list of available network interfaces.
NKAbuse also can run system commands executed on behalf of the device user, with the output sent through NKN to the bot master.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 15 Dec 2023 18:43:04 +0000


Cyber News related to NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol - The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities. NKAbuse infiltrates systems by uploading an implant to the victim host. The malware ...
6 months ago Securelist.com
New NKAbuse malware abuses NKN blockchain for stealthy comms - A new Go-based multi-platform malware identified as 'NKAbuse' is the first malware abusing NKN technology for data exchange, making it a stealthy threat. NKN is a relatively new decentralized peer-to-peer network protocol leveraging blockchain ...
6 months ago Bleepingcomputer.com
NKAbuse Threat Uses NKN Blockchain Network for DDoS Attacks - A new multiplatform threat that uses the peer-to-peer NKN network connectivity protocol as a communication channel for launching a range of threats, from distributed denial-of-service attacks to a remote access trojan. The multiple-threat malware, ...
6 months ago Securityboulevard.com
NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks - A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN for communication. Russian cybersecurity firm Kaspersky detailed the malware's capabilities in a ...
6 months ago Cysecurity.news
Why every company needs a DDoS response plan - Today's DDoS attacks are not what they were even a few years ago, and we continue to see DDoS attacks that are framed as the largest in history. As a result, large organizations need adaptive, multilayered defense capabilities that can respond just ...
6 days ago Helpnetsecurity.com
The Rise of DDoS Attacks in Q3, 2023: Are You Prepared? - The Indusface AppSec Q3, 2023 Report reveals a staggering 67% surge in DDoS attacks compared to the previous quarter, highlighting a concerning trend with profound impacts on various industries. Over 41% of websites have shown signs of DDoS attacks ...
6 months ago Cybersecuritynews.com
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines - A sophisticated and versatile malware called NKAbuse has been discovered operating as both a flooder and a backdoor, targeting Linux desktops in Colombia, Mexico, and Vietnam. According to a report this week from Kaspersky, this cross-platform ...
6 months ago Darkreading.com
The State of DDoS Attacks: Evolving Tactics and Targets Businesses Must Be Aware Of - Now, these attacks are becoming more dangerous, targeted, and detrimental as they evolve. As DDoS attacks become more sophisticated, adversaries are able to hone in on the most vulnerable targets, ranging from small- and medium-sized businesses to ...
6 months ago Cyberdefensemagazine.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
6 months ago Go.theregister.com
Linux, IoT backdoor stays stealthy using NKN blockchain The Register - Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network protocol. NKN is an open source protocol that lets users perform a peer-to-peer data exchange over a public blockchain - like a cross between a ...
6 months ago Packetstormsecurity.com
Exploring Blockchain's Revolutionary Impact on E-Commerce - The trend of choosing online shopping over traditional in-store visits is on the rise, with e-commerce transactions dominating the digital landscape. Blockchain technology emerges as a solution to bolster the security of online transactions. ...
7 months ago Cysecurity.news
How to Prepare for DDoS Attacks During Peak Business Times - One common tactic that many security practitioners have witnessed is carrying out distributed denial-of-service attacks during peak business times, when companies are more likely to be short-staffed and caught unawares. While DDoS attacks are a ...
6 months ago Darkreading.com
Security Series: Protecting the Edge Against DDoS Attacks with a Simplified Integrated Solution - An unprecedented increase in distributed-denial-of-service attacks in recent years has resulted in lost revenue and productivity, increased ransomware costs, and impacted service-level agreements for network operators. According to Zayo Group's ...
6 months ago Feedpress.me
NKAbuse Malware Attacking Linux Desktops & Corn Persistence - Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining unauthorized access over an extended period. Infiltrating via implant upload, it establishes persistence through a ...
6 months ago Gbhackers.com
VPN to protect against DDoS attacks on Twitch - Swarming or DDoS attacks pose a threat to streamers. Your data goes through a secure server, making it harder for attackers to target your actual IP address. A distributed denial-of-service attack globally harasses and attacks legitimate users and ...
6 months ago Itsecurityguru.org
Integrating the Power of AI and Blockchain for Data Security and Transparency - In an ever-changing digital landscape, providing strong data security and transparency has become critical. This article explores the dynamic interaction of two transformational technologies: artificial intelligence and blockchain. Artificial ...
5 months ago Cysecurity.news
AI and Blockchain Convergence: A Game Changer in the Digital Sector - AI and blockchain are two of the most revolutionary technologies of our time, and their combination will totally transform the tech sector. The two main axes around which blockchain is conceptualised are cryptocurrencies and the infrastructure ...
6 months ago Cysecurity.news
In Cybersecurity and Fashion, What's Old Is New Again - While distributed denial-of-service attacks and zero-day threats are nothing new in cybersecurity, they're still happening regularly for a simple reason: They work. In early November 2023, OpenAI blamed a DDoS attack for intermittent ChatGPT issues, ...
6 months ago Darkreading.com
How to Prevent DNS Attacks: DNS Security Best Practices - To protect against attack, best practices must be applied to protect the DNS protocol, the server on which the DNS protocol runs, and all access to the DNS processes. Implementing these best practices will not only protect DNS but also network ...
6 months ago Esecurityplanet.com
Essential DDoS statistics for understanding attack impact - The impact of DDoS attacks extends far beyond mere inconvenience, as they can result in financial losses, compromised data, and erosion of customer trust. Understanding the nature and consequences of DDoS activity is essential for organizations and ...
6 months ago Helpnetsecurity.com
Understanding the Escalating Threat of Web DDoS Tsunami Attacks - Whether it's hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed of destructive distributed denial of service attack - the Web DDoS Tsunami - ...
6 months ago Cyberdefensemagazine.com
DDoS Attacks on Rappler Linked to Proxy Service Providers in US and Russia - Qurium, the Swedish media foundation and human rights watchdog leading the investigation into these DDoS attacks implicates FineProxy and RayoByte in facilitating the attacks. On November 30, 2023, Rappler, the leading digital media company in the ...
6 months ago Hackread.com
87% of DDoS Attacks Targeted Windows OS Devices in 2023 - Computers and servers became the primary target of attacks, making up 92% of DDoS attempts, compared to only 68% in the previous year. Attacks are also becoming shorter and less frequent, but more powerful. While the overall count in attack frequency ...
1 month ago Darkreading.com
Pro-Russian DDoS Attacks Alarm Denmark and US - Distributed denial-of-service (DDoS) attacks by pro-Russian hacking groups have caused alarm in the US and Denmark after several incidents affected websites of hospitals and government offices in both countries. On Tuesday, Denmark announced that it ...
1 year ago Therecord.media

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)