Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

‘i2Ninja’ Malware Kit Using I2P for Anonymity

Security researchers at Trusteer are calling attention to a new malware toolkit that uses the I2P (Invisible Internet Project) networking layer to mask communications between infected machines and the botnet’s command-and-control server.

Security researchers at Trusteer are calling attention to a new malware toolkit that uses the I2P (Invisible Internet Project) networking layer to mask communications between infected machines and the botnet’s command-and-control server.

The malware, named i2Ninja, was spotted for sale at an underground Russian cyber-crime forum. At its core, i2Ninja is capable of HTML injection and form grabbing for all major browsers (Internet Explorer, Firefox and Chrome).

i2Ninja MalwareTrusteer’s researchers say it can also hijack FTP and e-mail credentials and even contains a ‘PokerGrabber’ module that targets major online poker sites.

“The i2Ninja takes its name from the malware’s use of I2P – a networking layer that uses cryptography to allow secure communication between its peer-to-peer users. While this concept is somewhat similar to TOR and TOR services, I2P was designed to maintain a true Darknet, an Internet within the Internet where secure and anonymous messaging and use of services can be maintained. The I2P network also offers HTTP proxies to allow anonymous Internet browsing,” the IBM company said in a blog post.

By using the I2P network, Trusteer says the malware can maintain secure communications between the infected devices and command and control server. “Everything from delivering configuration updates to receiving stolen data and sending commands is done via the encrypted I2P channels,” it added.

The i2Ninja malware also offers buyers a proxy for anonymous Internet browsing, promising complete online anonymity.

The toolkit, which is being peddled among cyber-criminals, also an integrated help desk via a ticketing system within the malware’s command and control. This can allow a potential buyer to communicate with the malware creator, open support tickets and get answers via I2P’s encrypted messaging feature.

In the past, malware toolkits like Citadel and Neosploit have offered “support” features but Trusteer says i2Ninja’s 24/7 secure help desk channel is a first.

Related: Attackers Hide Communication With Linux Backdoor

Related: Malware Increasingly Using P2P for C&C Functions

Related: Researchers Examine Depths of Cybercrime in Deep Web

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.