CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace
Three days after disclosure of a critical pre-authorization remote code execution vulnerability in the marimo Python notebook platform, multiple threat actors deployed malware hosted on HuggingFace Spaces. A previously undocumented NKAbuse variant was delivered through a typosquatted HuggingFace Space, utilizing NKN blockchain for command and control. Between April 11-14, 2026, eleven unique source IPs across ten countries generated 662 exploit events. Attack patterns included reverse shell campaigns, credential extraction targeting AWS keys and API tokens, DNS exfiltration, and lateral movement to PostgreSQL and Redis databases via leaked credentials. The malware binary was disguised as a legitimate Kubernetes tool named kagent and implemented persistence through systemd services, crontab entries, and macOS LaunchAgents. This operation demonstrates threat actors specifically targeting AI/ML infrastructure and leveraging trusted platforms for malware distribution.
Pulse ID: 69e09f9d80e986921250a6f3
Pulse Link: https://otx.alienvault.com/pulse/69e09f9d80e986921250a6f3
Pulse Author: AlienVault
Created: 2026-04-16 08:36:45
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AWS #BlockChain #CyberSecurity #DNS #InfoSec #Mac #MacOS #Malware #NKAbuse #OTX #OpenThreatExchange #PostgreSQL #Python #RAT #RCE #Redis #RemoteCodeExecution #Rust #SQL #Vulnerability #bot #botnet #AlienVault