{"id":45485,"date":"2026-04-17T01:07:41","date_gmt":"2026-04-16T17:07:41","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face\/"},"modified":"2026-04-17T01:07:41","modified_gmt":"2026-04-16T17:07:41","slug":"hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/17\/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face\/","title":{"rendered":"Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/09\/09\/hacker.jpg\" width=\"1600\" alt=\"Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face\"><\/p>\n<p>Hackers are exploiting a critical&nbsp;vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware hosted on Hugging Face Spaces.<\/p>\n<p>Attacks leveraging the remote code execution flaw (CVE-2026-39987)&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/\" target=\"_blank\" rel=\"nofollow noopener\">started last week<\/a> for credential theft, less than 10 hours after technical details were disclosed publicly, according to data from cloud-security company Sysdig.<\/p>\n<p>Sysdig researchers continued to monitor activity related to the security issue identified additional attacks, including a campaign that started on April 12 that abuses the Hugging Face Spaces platform for showcasing AI applications.<\/p>\n<p>Hugging Face serves as an AI development and machine learning-focused platform, acting as a hub for AI assets such as models, datasets, code, and tools, shared among the community.<\/p>\n<p>Hugging Face Spaces lets users deploy and share interactive web apps directly from a Git repository, typically for demos, tools, or experiments around AI.<\/p>\n<p>In the attacks that Sysdig observed, the attacker&nbsp;created a Space named <em>vsccode-modetx<\/em>&nbsp;(an intentional typosquat for VS Code) that hosts a dropper script (install-linux.sh) and a malware binary with the name <em>kagent<\/em>, also an attempt to mimic a legitimate Kubernetes AI agent tool.<\/p>\n<p>After exploiting the Marimo RCE, the threat actor ran a curl command to download the script from Hugging Face and execute it. Because Hugging Face Spaces is a legitimate HTTPS endpoint with a clean reputation, it is less likely to trigger alerts.<\/p>\n<p>The dropper script downloads the kagent binary, installs it locally, and sets up persistence via systemd, cron, or macOS LaunchAgent.<\/p>\n<p>According to the researchers, the payload is a previously undocumented variant of the DDoS-focused malware NKAbuse. Kaspersky <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-nkabuse-malware-abuses-nkn-blockchain-for-stealthy-comms\/\" target=\"_blank\" rel=\"nofollow noopener\">researchers reported the malware<\/a>&nbsp;in late 2023 and highlighted its novel abuse of the NKN (New Kind of Network) decentralized peer-to-peer network technology for data exchange.<\/p>\n<p>Sysdig says that the new variant functions as a remote access trojan that can execute shell commands on the infected system and send&nbsp;the output back to the operator.<\/p>\n<p>&ldquo;The binary references NKN Client Protocol, WebRTC\/ICE\/STUN for NAT traversal, proxy management, and structured command handling &ndash; matching the NKAbuse family initially documented by Kaspersky in December 2023,&rdquo; <a href=\"https:\/\/www.sysdig.com\/blog\/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface\" target=\"_blank\" rel=\"nofollow noopener\">mentions Sysdig in the report<\/a>.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"325\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/comp.jpg\" width=\"600\" alt=\"Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face\"><figcaption><em>Source: Sysdig<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Sysdig also spotted other notable attacks exploiting CVE-2026-39987, including a Germany-based operator who attempted 15 reverse-shell techniques across multiple ports.<\/p>\n<p>They then pivoted to lateral movement by extracting database credentials from environment variables and connecting to PostgreSQL, where they rapidly enumerated schemas, tables, and configuration data.<\/p>\n<p>Another actor from Hong Kong&nbsp;used stolen .env credentials to target a Redis server, systematically scanning all 16 databases and dumping stored data, including session tokens and application cache entries.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"395\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/redis.jpg\" width=\"600\" alt=\"Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face\"><figcaption><em>Source: Sysdig<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The overall takeaway is that exploitation of CVE-2026-39987 in the wild has increased in volume and tactics, and it&rsquo;s crucial that users upgrade to version 0.23.0 or later immediately.<\/p>\n<p>If upgrading is not possible, it is recommended to block external access to the &lsquo;\/terminal\/ws&rsquo; endpoint via a firewall, or block it entirely.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation\/\">Critical Marimo pre-auth RCE flaw now under active exploitation<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw\/\">Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/max-severity-flowise-rce-vulnerability-now-exploited-in-attacks\/\">Max severity Flowise RCE vulnerability now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks\/\">Critical Fortinet Forticlient EMS flaw now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now\/\">Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are exploiting a critical&nbsp;vulnerability in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45485","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45485"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45485\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}