Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cyber Attacks»NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks
    Cyber Attacks

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    By securnerd2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    A newly identified cyber threat named NKAbuse is making waves in the digital security landscape, employing a decentralized, peer-to-peer network protocol called NKN (New Kind of Network) as a conduit for its malicious activities.

    Russian cybersecurity firm Kaspersky disclosed in a recent report that the malware harnesses NKN technology for seamless data exchange between peers, acting as a robust implant with both flooder and backdoor functionalities.

    NKN, boasting a network of over 62,000 nodes, stands as a revolutionary software overlay network built upon the existing Internet infrastructure. It allows users to share unused bandwidth and earn token rewards, incorporating a blockchain layer atop the TCP/IP stack.

    In a departure from typical threat actor tactics, NKAbuse leverages blockchain technology not only for command-and-control communication but also to execute distributed denial-of-service (DDoS) attacks, operating as an embedded implant within compromised systems.

    The malware, coded in the Go programming language, exhibits a preference for targeting Linux systems, including Internet of Things (IoT) devices. While the full extent of the attacks remains uncertain, Kaspersky highlighted a specific incident involving the exploitation of a six-year-old critical security vulnerability in Apache Struts (CVE-2017-5638, CVSS score: 10.0) to infiltrate an undisclosed financial institution.

    Upon successful exploitation, NKAbuse deploys an initial shell script responsible for retrieving the implant from a remote server, contingent on the verification of the target host’s operating system. The malware accommodates eight distinct versions tailored to various CPU architectures, reinforcing its adaptability.

    Unlike some malware counterparts, NKAbuse lacks a self-propagation mechanism, necessitating delivery through an alternative access pathway, such as the exploitation of existing security vulnerabilities.

    Surviving system reboots is achieved through the utilization of cron jobs, requiring root access. The malware, upon confirming a user ID of 0, integrates itself into the system’s crontab, ensuring persistence after each reboot.

    Noteworthy features of NKAbuse include a comprehensive array of backdoor capabilities. These include sending periodic heartbeat messages to the bot master, transmitting system information, capturing screenshots, executing file operations, and running system commands.

    Kaspersky emphasized the meticulous design of NKAbuse, tailored for integration into a botnet while maintaining flexibility as a standalone backdoor. The incorporation of blockchain technology ensures both reliability and anonymity, hinting at the potential for the botnet’s gradual expansion without a discernible central controller.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 63

    Related Posts

    • Massive Cybersecurity Breach: Over 10,000 Cisco Devices Compromised in Zero-Day Attacks
    • Comfortable Pairs of Sneakers to Walk All Day
    • Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme
    • Indian Authorities Collaborate with Tech Giants in Massive Crackdown on Microsoft and Amazon Tech Support Scams
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    Malicious Ads Exploit macOS Users, Unleashing Stealer Malware

    April 1, 202418 Views

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    July 27, 2023222 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.