When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Cybersecurity researchers Aqua saw several attacks in the wild, and decided to run a honeypot.

Furthermore, the malware grants the attackers full control over the compromised endpoint.

Representational image depecting cybersecurity protection

It is usually used to run large-scale, mission-critical applications in finance, telecommunications, and e-commerce.

It was also said that Hadooken has traces of ransomware functionality.

The second IP address is registered in Russia, under the same hosting company.

It is currently inactive.

ViaThe Register

More from TechRadar Pro