RoadK1ll Malware Uses WebSocket Tunneling to Enable Stealthy Internal Network Intrusions

Views: 153 views

184/69 Wednesday, April 1, 2026

Cybersecurity researchers from Blackpoint Cyber have identified a new malware strain called RoadK1ll, a Node.js-based implant designed to act as a relay point for lateral movement within compromised networks. The malware operates stealthily by blending in with normal network traffic, transforming infected machines into controlled pivot points that attackers can use to reach deeper internal systems or restricted network segments that are typically inaccessible from the public internet.

Technically, RoadK1ll avoids inbound connections-which are often blocked by firewalls-and instead establishes outbound connections to attacker-controlled servers using the WebSocket protocol. This creates a tunnel for forwarding TCP traffic based on attacker commands. By leveraging the trusted internal network position of the compromised host, the malware bypasses perimeter defenses. It supports essential functions such as opening new connections, transmitting raw data, and monitoring connection status, enabling attackers to control multiple compromised machines through a single tunnel.

Although RoadK1ll does not use traditional persistence mechanisms like registry modifications or scheduled tasks, and only runs while the process is active, it incorporates an intelligent reconnection feature. This allows it to automatically re-establish WebSocket tunnels if the connection is interrupted, maintaining long-term access with minimal visibility. Analysts consider this a sign of increasingly sophisticated and flexible malware design. Organizations are advised to monitor unusual outbound connections and investigate Indicators of Compromise (IoCs) to detect and mitigate potential deep-network intrusions.

Source https://www.bleepingcomputer.com/news/security/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks/