vimarsana.com
Home
Live Updates
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux,
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux,
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines
The multifaceted malware leverages the NKN blockchain-based peer-to-peer networking protocol, operating as both a sophisticated backdoor and a flooder launching DDoS attacks.
Related Keywords
Vietnam ,
Republic Of ,
Palo Alto ,
Hidalgo ,
Mexico ,
Colombia ,
Lisandro Ubiedo ,
Multitool Malware ,
Equifax ,
Kaspersky ,
Palo Alto Network Unit ,
Mask Malicious ,
Palo Alto Network ,
Apache Struts ,