Security researchers at Trusteer are calling attention to a new malware toolkit that uses the I2P (Invisible Internet Project) networking layer to mask communications between infected machines and the botnet’s command-and-control server.
The malware, named i2Ninja, was spotted for sale at an underground Russian cyber-crime forum. At its core, i2Ninja is capable of HTML injection and form grabbing for all major browsers (Internet Explorer, Firefox and Chrome).
Trusteer’s researchers say it can also hijack FTP and e-mail credentials and even contains a ‘PokerGrabber’ module that targets major online poker sites.
“The i2Ninja takes its name from the malware’s use of I2P – a networking layer that uses cryptography to allow secure communication between its peer-to-peer users. While this concept is somewhat similar to TOR and TOR services, I2P was designed to maintain a true Darknet, an Internet within the Internet where secure and anonymous messaging and use of services can be maintained. The I2P network also offers HTTP proxies to allow anonymous Internet browsing,” the IBM company said in a blog post.
By using the I2P network, Trusteer says the malware can maintain secure communications between the infected devices and command and control server. “Everything from delivering configuration updates to receiving stolen data and sending commands is done via the encrypted I2P channels,” it added.
The i2Ninja malware also offers buyers a proxy for anonymous Internet browsing, promising complete online anonymity.
The toolkit, which is being peddled among cyber-criminals, also an integrated help desk via a ticketing system within the malware’s command and control. This can allow a potential buyer to communicate with the malware creator, open support tickets and get answers via I2P’s encrypted messaging feature.
In the past, malware toolkits like Citadel and Neosploit have offered “support” features but Trusteer says i2Ninja’s 24/7 secure help desk channel is a first.
Related: Attackers Hide Communication With Linux Backdoor
Related: Malware Increasingly Using P2P for C&C Functions
Related: Researchers Examine Depths of Cybercrime in Deep Web

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Tenable Launches $25 Million Early-Stage Venture Fund
- VMware Plugs Critical Code Execution Flaws
- GoTo Says Hackers Stole Encrypted Backups, MFA Settings
- Apple Patches WebKit Code Execution in iPhones, MacBooks
- Thoma Bravo to Buy Magnet Forensics in $1.3B Transaction
- T-Mobile Says Hackers Used API to Steal Data on 37 Million Accounts
- Chainguard Trains Spotlight on SBOM Quality Problem
- Exploited Control Web Panel Flaw Added to CISA ‘Must-Patch’ List
Latest News
- Russian Millionaire on Trial in Hack, Insider Trade Scheme
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
