Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

‘i2Ninja’ Malware Kit Using I2P for Anonymity

Security researchers at Trusteer are calling attention to a new malware toolkit that uses the I2P (Invisible Internet Project) networking layer to mask communications between infected machines and the botnet’s command-and-control server.

Security researchers at Trusteer are calling attention to a new malware toolkit that uses the I2P (Invisible Internet Project) networking layer to mask communications between infected machines and the botnet’s command-and-control server.

The malware, named i2Ninja, was spotted for sale at an underground Russian cyber-crime forum. At its core, i2Ninja is capable of HTML injection and form grabbing for all major browsers (Internet Explorer, Firefox and Chrome).

i2Ninja MalwareTrusteer’s researchers say it can also hijack FTP and e-mail credentials and even contains a ‘PokerGrabber’ module that targets major online poker sites.

“The i2Ninja takes its name from the malware’s use of I2P – a networking layer that uses cryptography to allow secure communication between its peer-to-peer users. While this concept is somewhat similar to TOR and TOR services, I2P was designed to maintain a true Darknet, an Internet within the Internet where secure and anonymous messaging and use of services can be maintained. The I2P network also offers HTTP proxies to allow anonymous Internet browsing,” the IBM company said in a blog post.

By using the I2P network, Trusteer says the malware can maintain secure communications between the infected devices and command and control server. “Everything from delivering configuration updates to receiving stolen data and sending commands is done via the encrypted I2P channels,” it added.

The i2Ninja malware also offers buyers a proxy for anonymous Internet browsing, promising complete online anonymity.

The toolkit, which is being peddled among cyber-criminals, also an integrated help desk via a ticketing system within the malware’s command and control. This can allow a potential buyer to communicate with the malware creator, open support tickets and get answers via I2P’s encrypted messaging feature.

In the past, malware toolkits like Citadel and Neosploit have offered “support” features but Trusteer says i2Ninja’s 24/7 secure help desk channel is a first.

Related: Attackers Hide Communication With Linux Backdoor

Advertisement. Scroll to continue reading.

Related: Malware Increasingly Using P2P for C&C Functions

Related: Researchers Examine Depths of Cybercrime in Deep Web

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.