Close Menu
    Facebook X (Twitter) Instagram
    Friday, November 14
    Facebook X (Twitter) Instagram
    SecurNerd
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cyber Attacks»NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks
    Cyber Attacks

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    securnerdBy securnerdDecember 15, 2023No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A newly identified cyber threat named NKAbuse is making waves in the digital security landscape, employing a decentralized, peer-to-peer network protocol called NKN (New Kind of Network) as a conduit for its malicious activities.

    Russian cybersecurity firm Kaspersky disclosed in a recent report that the malware harnesses NKN technology for seamless data exchange between peers, acting as a robust implant with both flooder and backdoor functionalities.

    NKN, boasting a network of over 62,000 nodes, stands as a revolutionary software overlay network built upon the existing Internet infrastructure. It allows users to share unused bandwidth and earn token rewards, incorporating a blockchain layer atop the TCP/IP stack.

    In a departure from typical threat actor tactics, NKAbuse leverages blockchain technology not only for command-and-control communication but also to execute distributed denial-of-service (DDoS) attacks, operating as an embedded implant within compromised systems.

    The malware, coded in the Go programming language, exhibits a preference for targeting Linux systems, including Internet of Things (IoT) devices. While the full extent of the attacks remains uncertain, Kaspersky highlighted a specific incident involving the exploitation of a six-year-old critical security vulnerability in Apache Struts (CVE-2017-5638, CVSS score: 10.0) to infiltrate an undisclosed financial institution.

    Upon successful exploitation, NKAbuse deploys an initial shell script responsible for retrieving the implant from a remote server, contingent on the verification of the target host’s operating system. The malware accommodates eight distinct versions tailored to various CPU architectures, reinforcing its adaptability.

    Unlike some malware counterparts, NKAbuse lacks a self-propagation mechanism, necessitating delivery through an alternative access pathway, such as the exploitation of existing security vulnerabilities.

    Surviving system reboots is achieved through the utilization of cron jobs, requiring root access. The malware, upon confirming a user ID of 0, integrates itself into the system’s crontab, ensuring persistence after each reboot.

    Noteworthy features of NKAbuse include a comprehensive array of backdoor capabilities. These include sending periodic heartbeat messages to the bot master, transmitting system information, capturing screenshots, executing file operations, and running system commands.

    Kaspersky emphasized the meticulous design of NKAbuse, tailored for integration into a botnet while maintaining flexibility as a standalone backdoor. The incorporation of blockchain technology ensures both reliability and anonymity, hinting at the potential for the botnet’s gradual expansion without a discernible central controller.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 252
    Featured
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGoogle just launched a new AI and has already admitted at least one demo wasn’t real
    Next Article New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks Worldwide
    securnerd
    • Website
    • Facebook
    • X (Twitter)
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Python June 23, 2024

    PyQt Mastery: From Beginner to Advanced

    June 23, 2024
    AI June 9, 2024

    Learn AI by yourself! Recommended AI study and learning methods that beginners won’t be discouraged by!

    June 9, 2024
    AI June 7, 2024

    Foundation Models: The Heart of Generative AI

    June 7, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Join the Community
    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20236 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20232 Views

    Debian Project Launches Debian 12.1 “Bookworm” Featuring 89 Bug Remediations and 26 Security Enhancements

    July 24, 202310 Views

    A Mild, Sweet Fruit With a Fibrous Center

    September 6, 20230 Views

    For Good Results Must Be Make Good Plan

    September 6, 20230 Views

    Mistakes You Might Be Making With Your Watch

    September 6, 20231 Views

    Top Men’s Fashion Trends From Spring

    September 6, 20230 Views

    Surprising Benefits of Honeydew Melon

    September 6, 20230 Views

    Spicy Crispy Chicken Burger Recipe

    September 6, 20230 Views

    Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware

    September 23, 202336 Views
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.