Why Cryptocurrency Platforms Aren’t Fully Secure and Tips to Safeguard Your Assets

Why Cryptocurrency Platforms Aren’t Fully Secure and Tips to Safeguard Your Assets

Cybersecurity firm Kaspersky recently discovered a new malicious program, NKAbuse, which attacks the blockchain – the public record of transactions used by cryptocurrencies. This malware grants unauthorized access to other people’s information and can lead to theft of assets.

The advanced threat operates on the New Kind of Network (NKN), a blockchain connectivity protocol. It uses peer-to-peer communication to let criminals take control of infected computers.

The malware initially surfaced in Vietnam, but has since appeared in Colombia, Mexico, and Argentina. This article will outline the nature of this attack, how it abuses the blockchain, and what precautions you can take to prevent falling victim to it.

Understanding the NKN Protocol and NKAbuse Attack

NKN, or New Kind of Network, is a decentralized, open source, and anonymous peer-to-peer connectivity protocol. It aims to serve as the blockchain equivalent to TCP/IP. The protocol connects various devices through the internet, using the blockchain to record all transactions and operations carried out on the network.

However, Kaspersky warns that this protocol can be exploited. NKAbuse is a hybrid implant that serves as a backdoor/RAT and flooder, providing attackers with unauthorized access to victims’ systems and allowing them to covertly execute commands, steal data, and monitor activities. The flooder tool is used to send many messages in a certain channel and can lead to a Distributed Denial of Service (DDoS) attack.

NKAbuse’s Malware Actions and Asset Theft

Once the malware is installed on a victim’s computer, the attacker can take screenshots, manage files, retrieve system and network information, and execute system commands. The collected data is sent to the botmaster through the NKN network, using decentralized communication for a stealthy and efficient attack.

Avoiding NKAbuse Attacks

While blockchain technology is generally secure, users must be aware that it is not invulnerable and they must take precautions to protect themselves. This includes continuous education, using secure wallets or platforms, enabling two-factor authentication, using strong and unique passwords, being wary of scams and phishing attempts, making secure backups, verifying transactions, and investing consciously. In addition, regularly updating operating systems, applications, and antivirus software can help correct any known vulnerabilities.