Check us out on Instagram

Cyber Society

New Malware Abuses Blockchain For Stealthy Comms

New Malware Abuses Blockchain For Stealthy Comms

New Malware Abuses Blockchain For Stealthy Comms
byDarsh Poddaron Dec 14, 2023
SecurityMatters
StayAlert

In the ever-evolving landscape of cybersecurity, a formidable and sophisticated threat has emerged—meet 'NKAbuse,' a groundbreaking Go-based malware leveraging the innovative NKN (New Kind of Network) technology for covert communication. NKN, a decentralized peer-to-peer network protocol, harnesses the power of blockchain to establish a secure and transparent framework for resource management.

NKN: Revolutionizing Data Transmission

At the core of NKN's mission lies the optimization of data transmission speed and latency across its extensive network. With approximately 60,710 nodes—akin to the Tor network—participating in the NKN network, it boasts robustness, decentralization, and a capacity to handle substantial data volumes.

NKAbuse Unleashed: A Stealthy Cyber Threat

Recently exposed by Kaspersky, NKAbuse is a cutting-edge malware specifically targeting Linux desktops in Mexico, Colombia, and Vietnam. Its modus operandi involves exploiting an old Apache Struts flaw (CVE-2017-5638) to infiltrate a financial company. While Linux systems are its primary targets, the malware showcases versatility by compromising IoT devices and supporting MIPS, ARM, and 386 architectures.

Blockchain-Infused DDoS Attacks: The NKAbuse Signature Move

What sets NKAbuse apart is its clever use of NKN to execute distributed denial of service (DDoS) attacks. By leveraging the NKN public blockchain protocol, the malware conducts flooding attacks—creating a discreet backdoor within Linux systems. This innovative approach not only evades easy traceability and detection but also presents an additional layer of complexity for cybersecurity professionals.

Unraveling NKAbuse's Communication Strategy

NKAbuse communicates with its bot master through NKN, facilitating data exchange while establishing multiple concurrent channels for enhanced communication resilience. The payload commands issued by the command and control (C2) center encompass a spectrum of attack vectors, ranging from HTTP and TCP to UDP, PING, ICMP, and SSL flood attacks targeted at specific victims.

Beyond DDoS: NKAbuse as a Remote Access Trojan (RAT)

Adding to its arsenal, NKAbuse functions as a remote access trojan (RAT), providing operators with the capability to execute commands, exfiltrate data, and capture screenshots. The adaptability and versatility of NKAbuse challenge conventional norms within the DDoS botnet landscape.

Blockchain's Double-Edged Sword: A Challenge for Defenders

The use of blockchain technology not only guarantees the availability of NKAbuse but also obfuscates the source of attacks, presenting a formidable challenge for defenders. In this intricate dance between cyber adversaries and defenders, NKAbuse introduces a new cadence, compelling security professionals to fortify their arsenals against this innovative and elusive threat.

Conclusion: The New Reality of Cybersecurity

As the cybersecurity landscape evolves, NKAbuse showcases the evolution of cyber threats, introducing a novel approach that demands heightened vigilance. Whether you're a technical expert or a non-technical user, remember—cybersecurity is everyone's responsibility. Stay tuned for more updates on navigating the digital world safely.