IT
Kaspersky exposes NKAbuse, a multiplatform malware leveraging blockchain technology

Kaspersky exposes NKAbuse, a multiplatform malware leveraging blockchain technology

Kaspersky’s Global Emergency Response Team (GERT) and Global Research and Analysis Teams (GReAT) uncovered NKAbuse, a novel multiplatform malware. This advanced threat, developed in Go, uses peer-to-peer communication, functioning both as a flooder and a backdoor.

 

In a recent incident response analysis, Kaspersky’s experts found a new malware that exploits NKN technology, a peer-to-peer, blockchain-oriented networking protocol known for its decentralization and privacy. Kaspersky Security Network identified potential victims of the attack in Colombia, Mexico, and Vietnam.

 

NKAbuse is a hybrid implant that serves as both a backdoor/RAT and a flooder, making it a versatile dual threat. In its backdoor/RAT role, NKAbuse provides attackers with unauthorized access to victims’ systems enabling the attacker to covertly execute commands, steal data, and monitor activities. This feature is particularly valuable for espionage and data exfiltration. Simultaneously, as a flooder, it is capable of launching destructive DDoS attacks overwhelming and disrupting targeted servers or networks, significantly impacting organizational operations.

 

The malware’s advanced features extend to capturing screenshots, managing files, retrieving system and network information, and executing system commands. The collected data is sent to its botmaster via the NKN network using decentralized communications for stealth and efficiency.

 

NKAbuse's infiltration process begins by exploiting the old RCE vulnerability CVE-2017-5638, allowing attackers to take over the affected systems. After gaining control, the malware downloads an implant onto the victim's host. This implant is initially placed in a temporary directory for execution. NKAbuse then establishes persistence by creating a cron job and situates itself within the host’s home folder, ensuring its continuous operation within the system.

 

"The implant's use of the NKN protocol underlines its advanced communication strategy, enabling decentralized, anonymous operations and leveraging NKN's blockchain features for efficient, stealthy communication between infected nodes and C2 servers,” says Lisandro Ubiedo, security researcher at Kaspersky GReAT. “This approach complicates detection and mitigation efforts. I would like to commend the Kaspersky GERT team for their exceptional effort in identifying this sophisticated threat."

 

The choice of Go enables cross-platform compatibility allowing NKAbuse to target various operating systems and architectures, including Linux desktops and IoT devices. This programming language enhances the implant's performance, particularly in networked applications, ensuring efficient and concurrent processing. Moreover, Go's ability to produce self-contained binaries simplifies deployment and enhances robustness, making NKAbuse a formidable tool in the realm of cybersecurity threats.

 

 

Leave A Comment