• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new nkabuse malware exploits nkn blockchain tech for ddos attacks

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

You are here: Home / General Cyber Security News / New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks
December 15, 2023

A novel multi-platform danger named NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol acknowledged as NKN (limited for New Kind of Network) as a communications channel.

“The malware makes use of NKN technology for information exchange among friends, functioning as a potent implant, and equipped with both of those flooder and backdoor abilities,” Russian cybersecurity company Kaspersky claimed in a Thursday report.

NKN, which has around 62,000 nodes, is explained as a “computer software overlay network built on leading of today’s Internet that enables users to share unused bandwidth and generate token rewards.” It incorporates a blockchain layer on major of the present TCP/IP stack.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Impending WEBINAR Conquer AI-Driven Threats with Zero Trust – Webinar for Security Gurus

Common security steps will never minimize it in today’s globe. It can be time for Zero Have faith in Security. Safe your data like never in advance of.

Be a part of Now

Though threat actors are known to choose advantage of emerging interaction protocols for command-and-command (C2) functions and evade detection, NKAbuse leverages blockchain technology to conduct distributed denial-of-assistance (DDoS) attacks and perform as an implant inside compromised methods.

Precisely, it utilizes the protocol to converse to the bot grasp and obtain/send instructions. The malware is implemented in the Go programming language, and evidence details to it being used generally to solitary out Linux systems, such as IoT equipment.

It can be presently not identified how prevalent the attacks are, but one particular instance discovered by Kaspersky entails the exploitation of a 6-year-old critical security flaw in Apache Struts (CVE-2017-5638, CVSS score: 10.) to breach an unnamed monetary enterprise.

NKN Blockchain Tech

Prosperous exploitation is adopted by the supply of an first shell script which is responsible for downloading the implant from a remote server, but not prior to examining the working procedure of the target host. The server hosting the malware houses eight diverse versions of NKAbuse to guidance numerous CPU architectures: i386, arm64, arm, amd64, mips, mipsel, mips64, and mips64el.

A different noteworthy facet is its lack of a self-propagation system, which means the malware demands to be sent to a concentrate on by a further original obtain pathway, this sort of as by way of the exploitation of security flaws.

Cybersecurity

“NKAbuse can make use of cron work to survive reboots,” Kaspersky reported. “To achieve that, it desires to be root. It checks that the existing consumer ID is and, if so, proceeds to parse the existing crontab, including itself for every reboot.”

NKAbuse also incorporates a bevy of backdoor attributes that enable it to periodically mail a heartbeat information to the bot grasp, which includes details about the procedure, seize screenshots of the present-day display, carry out file operations, and operate technique instructions.

“This particular implant seems to have been meticulously crafted for integration into a botnet, nonetheless it can adapt to performing as a backdoor in a certain host,” Kaspersky explained. “What’s more, its use of blockchain technology ensures both equally reliability and anonymity, which suggests the possible for this botnet to extend steadily in excess of time, seemingly devoid of an identifiable central controller.”

Identified this write-up fascinating? Follow us on Twitter  and LinkedIn to study much more distinctive information we article.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «116 malware packages found on pypi repository infecting windows and 116 Malware Packages Found on PyPI Repository Infecting Windows and Linux Systems
Next Post: Google’s New Tracking Protection in Chrome Blocks Third-Party Cookies google's new tracking protection in chrome blocks third party cookies»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.