Recent OTX pulses indicate a surge in sophisticated, platform-specific malware campaigns leveraging legitimate infrastructure for stealth. The primary threats identified include ASO RAT, a comprehensive Android surveillance platform masquerading as government applications in Syria, and NKAbuse, a blockchain-based botnet exploiting the marimo Python notebook vulnerability (CVE-2026-39987) to propagate via HuggingFace Spaces. Concurrently, the threat actor alh1mik has re-emerged with notnullOSX, a modular macOS stealer exclusively targeting high-value cryptocurrency wallets ($10K+) using social engineering (ClickFix) and malicious DMGs. These campaigns collectively demonstrate a shift toward using trusted platforms (app stores, ML repositories) for initial access and blockchain networks for resilient C2 infrastructure.
Attack Chain & Objectives
- Initial Access: Malicious APKs (ASO RAT), poisoned ML repositories (NKAbuse), and social engineering via DMGs (notnullOSX).
- Execution: Droppers unpack payloads that establish persistence (ASO RAT on Android; LaunchAgents on macOS).
- C2 & Exfiltration: ASO RAT uses DDNS (aso.ddns.net); NKAbuse uses the NKN blockchain for C2; notnullOSX exfiltrates wallet data to specific domains.
- Objective: Intelligence gathering/Surveillance (Syria), Infrastructure hijacking (Blockchain), and Financial Theft (Cryptocurrency).
Threat Actor / Malware Profile
| Malware Family | Actor | Distribution | Payload Behavior | C2 & Persistence |
|---|---|---|---|---|
| ASO RAT | Unknown | Disguised as PDF readers/Syrian gov apps via APK | SMS interception, GPS tracking, camera/mic access, DDoS | C2: aso.ddns.net (Frankfurt infra); Pers: System App installation |
| NKAbuse / kagent | Unknown | Exploits CVE-2026-39987 via marimo on HuggingFace | Blockchain node participation, DDoS, RCE | C2: NKN Blockchain network; Pers: Python notebook persistence |
| notnullOSX | alh1mik (0xFFF) | ClickFix social engineering, malicious DMG files | Steals crypto wallets, browser cookies, system info | C2: coockie.pro and related domains; Pers: macOS LaunchAgents |
Key Techniques
- ASO RAT: Requests extensive permissions on installation; utilizes CVE-2023-44487 (HTTP/2) and CVE-2025-23419 in its infrastructure stack.
- NKAbuse: Typosquatting on HuggingFace Spaces to deliver payloads; leverages decentralized blockchain for command and control to avoid takedowns.
- notnullOSX: Written in Go; bypasses Gatekeeper via ad-hoc signing or malformed DMGs; specifically filters for wallets with high balances.
IOC Analysis
The provided IOCs span multiple vectors, requiring a layered defense approach:
- Network Hostnames/Domains:
aso.ddns.netandcoockie.proare critical C2 nodes. DNS Sinkholing or firewall blocking is immediately required. - File Hashes (MD5/SHA1/SHA256): A large volume of hashes are provided for droppers and payloads. These should be uploaded to EDR quarantine lists and SIEM correlation engines.
- CVEs: CVE-2026-39987 is a critical RCE in
marimo. Vulnerability scanning for Python notebook environments is essential to prevent NKAbuse propagation.
Operational Guidance: SOC teams should enrich these hashes using VirusTotal and hash-lookup services. Network logs (DNS, HTTP/2 flows) should be queried for the listed domains and the HTTP/2 Rapid Reset attack pattern associated with CVE-2023-44487.
Detection Engineering
---
title: Potential ASO RAT Android Activity
description: Detects potential C2 communication patterns associated with ASO RAT based on known hostnames and suspicious Android APK installation behavior.
status: stable
date: 2026/05/16
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6651a13f7918290d0b12d435
tags:
- attack.command_and_control
- attack.mobile_equipment
logsource:
product: android
definition: 'Requires Google Play Protect or Mobile EDR logs'
detection:
selection_dns:
query|contains:
- 'aso.ddns.net'
selection_package:
packageName|contains:
- 'com.adobe.pdf'
- 'com.syria.gov'
condition: 1 of selection_
falsepositives:
- Legitimate government apps (unlikely in non-Syria regions)
- Benign PDF readers
level: high
---
title: NKAbuse Botnet via Marimo Exploit
status: stable
description: Detects exploitation attempts of CVE-2026-39987 in marimo notebooks or suspicious Python process execution related to HuggingFace Space typosquatting.
date: 2026/05/16
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6651a13f7918290d0b12d436
logsource:
category: process_creation
product: linux
detection:
selection_exploit:
CommandLine|contains:
- 'marimo'
- 'huggingface'
selection_malware:
ImagePath|endswith:
- '/python'
CommandLine|contains:
- 'nkn'
- 'blockchain'
condition: 1 of selection_
falsepositives:
- Legitimate data science usage of marimo/huggingface
level: critical
---
title: notnullOSX macOS Stealer Execution
description: Detects execution characteristics of notnullOSX stealer, including unusual DMG mounts and Go binary execution accessing cryptocurrency wallet paths.
date: 2026/05/16
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6651a13f7918290d0b12d437
tags:
- attack.credential_access
- attack.execution
logsource:
category: process_creation
product: macos
detection:
selection_dmg:
ImagePath|contains: '/Volumes/'
ImagePath|endswith: '.app/Contents/MacOS/'
selection_crypto:
CommandLine|contains:
- 'Library/Application Support/Bitcoin'
- 'Library/Application Support/Ethereum'
- '.wallet'
selection_network:
DestinationHostname|contains:
- 'coockie.pro'
condition: 1 of selection_
falsepositives:
- Legitimate wallet management software opening wallets
- Standard DMG installations
level: high
kql
// Hunt for NKAbuse indicators and marimo exploitation activity
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl has "huggingface" or RemoteUrl has "marimo"
| project Timestamp, DeviceName, InitiatingProcessAccountName, RemoteUrl, RemoteIP
| union (DeviceProcessEvents
| where Timestamp > ago(7d)
| where ProcessCommandLine has_any ("nkn", "blockchain", "marimo")
| project Timestamp, DeviceName, AccountName, ProcessCommandLine, FileName)
| summarize count() by DeviceName, bin(Timestamp, 1h)
powershell
# IOC Hunt Script for ASO RAT (Network) and notnullOSX (macOS Artifacts)
# Note: This script is designed to run on endpoints or via an EDR tool.
Write-Host "Starting IOC Hunt for ASO RAT and notnullOSX..." -ForegroundColor Cyan
# 1. Check for ASO RAT C2 Domains in DNS Cache (Windows)
$ASO_Domains = @("aso.ddns.net")
Write-Host "Checking DNS Cache for ASO RAT C2 domains..." -ForegroundColor Yellow
Get-DnsClientCache | Where-Object { $ASO_Domains -contains $_.Entry } | Select-Object Entry, Data
# 2. macOS specific checks (Requires PS-Core or bash wrapper)
# Checking for common persistence locations used by stealers like notnullOSX
if ($IsMacOS) {
Write-Host "macOS Detected. Checking LaunchAgents for suspicious persistence..." -ForegroundColor Yellow
$LaunchAgentsPath = "$env:HOME/Library/LaunchAgents"
if (Test-Path $LaunchAgentsPath) {
Get-ChildItem -Path $LaunchAgentsPath -Filter *.plist | ForEach-Object {
$content = Get-Content $_.FullName -Raw
if ($content -match "coockie.pro" -or $content -match "/tmp/" -or $content -match "hidden") {
Write-Host "Suspicious LaunchAgent found: $($_.Name)" -ForegroundColor Red
}
}
}
} else {
Write-Host "Not a macOS host. Skipping macOS specific checks." -ForegroundColor Gray
}
Write-Host "Hunt Complete." -ForegroundColor Green
Response Priorities
- Immediate:
- Block the domains
aso.ddns.netandcoockie.proat the perimeter firewall and proxy. - Quarantine systems matching the provided file hashes (MD5/SHA1/SHA256).
- Patch
marimoinstances immediately to mitigate CVE-2026-39987.
- Block the domains
- 24 Hours:
- Initiate credential resets for high-privilege users in the targeted sectors (Gov/Media) and any users known to hold cryptocurrency.
- Review mobile device management (MDM) logs for the installation of "Syrian government" apps or unknown PDF readers on corporate devices.
- 1 Week:
- Implement application whitelisting for Python notebooks and restrict outbound access to public blockchain nodes (NKN) from developer workstations.
- Enhance mobile security protocols to detect APK side-loading and excessive permission requests.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.