Connect with us

Hi, what are you looking for?

Top Stories

Hugging Face Vulnerability Exploited to Deploy NKAbuse Blockchain Malware in RCE Attacks

Threat actors exploit the Marimo Python notebook vulnerability (CVE-2026-39987) to deploy NKAbuse malware via Hugging Face, launching 662 attacks in just three days.

Just three days after the disclosure of a critical pre-authorization remote code execution (RCE) vulnerability in the Marimo Python notebook platform on April 8, 2026, threat actors began actively exploiting this flaw. Tracked as CVE-2026-39987, the vulnerability allows unauthenticated attackers to obtain a full interactive shell, enabling them to execute arbitrary system commands without requiring credentials. According to the Sysdig Threat Research Team (TRT), attackers are utilizing this vulnerability to deploy a previously undocumented variant of the NKAbuse malware, which is being hosted directly on Hugging Face Spaces.

The swift weaponization of this vulnerability underscores a concerning trend of targeting artificial intelligence and machine learning (AI/ML) infrastructure. Between April 11 and April 14, 2026, Sysdig researchers recorded 662 exploit events originating from 11 unique IP addresses across 10 countries. The attacks escalated quickly, evolving from simple RCE verification to complex, multi-hour interactive sessions, suggesting a high level of sophistication among the attackers.

After compromising the Marimo platform, the attackers demonstrated structured playbooks, with aggressive credential harvesting emerging as the most common behavior observed by Sysdig TRT. They systematically extracted environment variables to steal critical assets such as AWS access keys, OpenAI API tokens, and database connection strings, which they could resell or use later for further attacks. In cases where direct reverse shell attempts were unsuccessful, attackers effectively pivoted to lateral movement using the harvested credentials.

Sysdig TRT documented various sophisticated techniques employed by different operators. For instance, one operator in Germany managed to connect to a PostgreSQL honeytrap using leaked credentials, quickly enumerating schemas, tables, and server configurations. Another attacker executed parallel connections across all 16 Redis databases, successfully enumerating and dumping every key, including session tokens and cache data. When firewalls impeded outbound network connections, operators employed DNS-based confirmation techniques to verify their remote code execution efforts.

The most alarming discovery during this campaign was the deployment of an advanced malware payload through a typosquatted Hugging Face Space named “vsccode-modetx.” By utilizing a trusted platform with a clean domain reputation, the attackers effectively bypassed traditional security monitoring and URL filtering mechanisms. According to Sysdig research, this malicious Hugging Face Space served solely as a static file hosting service for a shell script dropper that delivered a new variant of the NKAbuse malware.

This Go-based backdoor utilizes the NKN blockchain for command-and-control (C2) communications, rendering it highly resilient against conventional takedowns. Key technical aspects of the malware deployment include deceptive naming; the payload is referred to as “kagent,” deliberately mimicking a legitimate Kubernetes AI agent tool to blend seamlessly into developer environments. The malware also establishes silent persistence across both Linux and macOS systems, using systemd user services, crontab entries, or macOS LaunchAgents.

The rapid exploitation of the Marimo vulnerability and the sophisticated methods of lateral movement signal a potentially transformative moment in cyber threats targeting AI infrastructure. As the integration of AI and machine learning continues to evolve in various sectors, the implications of such vulnerabilities could extend far beyond immediate financial loss. Organizations must strengthen their security postures and vigilance against these emerging threats, especially as attackers increasingly leverage trusted platforms to mask their malicious activities.

See also
Staff
Written By

The AiPressa Staff team brings you comprehensive coverage of the artificial intelligence industry, including breaking news, research developments, business trends, and policy updates. Our mission is to keep you informed about the rapidly evolving world of AI technology.

You May Also Like

Top Stories

Hugging Face's HoloTab Chrome extension enables AI models to mimic human behavior in web applications, enhancing automation without site-specific integrations.

Top Stories

MiniMax launches the free M2.7 AI model with 229 billion parameters, outperforming Gemini 3.1 Pro in key benchmarks and enhancing multi-agent capabilities.

AI Generative

MegaTrain enables the training of 120 billion parameter language models on a single NVIDIA H200 GPU, revolutionizing AI development by bypassing HBM limits.

Top Stories

Hugging Face donates its Safetensors project to the PyTorch Foundation, enhancing AI security by mitigating risks associated with arbitrary code execution.

Top Stories

French startup H Company unveils Holo3, a multimodal AI model with 35 billion parameters capable of executing complex tasks across multiple applications.

Top Stories

PyTorch Foundation integrates Safetensors to enhance AI model security, ensuring safe distribution and faster loading while minimizing code execution risks.

Top Stories

The Global AI Enthusiast Forums Market is projected to soar from $3 billion in 2026 to $15 billion by 2033, driven by a 19.5%...

Top Stories

KRAFTON unveils Raon, its first family of open-source AI models, featuring four advanced solutions that enhance gaming with top-tier speech and vision capabilities.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.