Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining

December 27, 2023 at 01:06AM Adversaries are targeting poorly secured Linux SSH servers to install malware for carrying out cryptocurrency mining and DDoS attacks. AhnLab Security Emergency Response Center warns of installing scanners and selling breached IP and account credentials on the dark web. To mitigate risks, users are advised to use strong, updated passwords … Read more

Complex ‘NKAbuse’ Malware Uses Blockchain to Hide on Linux, IoT Machines

December 15, 2023 at 01:22PM A versatile malware named NKAbuse, deployed as both a flooder and backdoor, has been discovered targeting Linux systems in Colombia, Mexico, and Vietnam. Written in Go, it exploits the NKN blockchain-oriented peer-to-peer networking protocol. Utilizing various methods, including exploiting vulnerabilities, it has the capacity to launch DDoS attacks and compromise … Read more

NKabuse backdoor harnesses blockchain brawn to hit several architectures

December 15, 2023 at 09:36AM Researchers have discovered a new multi-platform malware, “NKAbuse,” leveraging the NKN protocol for anonymous and reliable data exchange. The malware exploits an Apache Struts 2 vulnerability and targets various architectures, with a priority for Linux. It offers DDoS attacks and RAT functionality, and has been found in organizations in Mexico, … Read more

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

December 15, 2023 at 01:24AM A new threat named NKAbuse has emerged, using the decentralized NKN network for communication. The malware leverages NKN technology to conduct DDoS attacks and function as an implant in compromised Linux systems, with potential expansion into IoT devices. NKAbuse lacks self-propagation and integrates backdoor features, making it a serious security … Read more

New NKAbuse malware abuses NKN blockchain for stealthy comms

December 14, 2023 at 05:16PM NKAbuse is a new Go-based multi-platform malware exploiting NKN (New Kind of Network) technology. It targets Linux desktops, IoT devices, and supports MIPS, ARM, and 386 architectures. It uses NKN for DDoS attacks and as a remote access trojan, making it difficult to detect and defend against. Its use of … Read more