Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux,

Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines

The multifaceted malware leverages the NKN blockchain-based peer-to-peer networking protocol, operating as both a sophisticated backdoor and a flooder launching DDoS attacks.

Related Keywords

Vietnam , Republic Of , Palo Alto , Hidalgo , Mexico , Colombia , Lisandro Ubiedo , Multitool Malware , Equifax , Kaspersky , Palo Alto Network Unit , Mask Malicious , Palo Alto Network , Apache Struts ,

© 2025 Vimarsana