Hackers Deploy RoadK1ll Pivoting Malware to Turn Compromised Hosts Into Network Relays

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A new piece of malware called RoadK1ll has been found silently converting compromised machines into controllable network relay points.

Unlike most malware that arrives loaded with commands and attack tools, RoadK1ll is deliberately lean, built around one goal: giving attackers a reliable and silent path deeper into a network after initial compromise.

That narrow focus makes it genuinely dangerous, not for what it does alone, but for what it enables afterward.

RoadK1ll is a Node.js-based reverse tunneling implant that establishes an outbound WebSocket connection from the infected machine to attacker-controlled infrastructure.

Once that connection is live, the compromised host becomes a relay, and the attacker can push instructions through this channel, directing the system to open TCP connections to internal hosts or segments normally cut off from outside access.

A single infected machine can unlock entire sections of a network that security teams believed were safely isolated.

Blackpoint Response Operations Center (BROC) analysts identified RoadK1ll during analysis of a recent network intrusion.

Researchers Nevan Beal and Sam Decker published their findings on March 19, 2026, describing the implant as a purpose-built post-compromise capability rather than a traditional remote access tool.

What stood out most was how it was designed not to carry out direct attacks, but to expand the reach of an initial breach by turning one compromised host into a reusable pivot point for broader movement.

The impact of RoadK1ll becomes clear when you consider how quietly it operates inside a network. By using only outbound web-style traffic and never placing an inbound listener on the victim machine, the implant blends naturally into normal network activity.

There is no aggressive scanning, no suspicious open ports, and no large command set that would raise alerts during routine monitoring. The malware simply waits on the infected host, acting only when the attacker sends an instruction through the tunnel.

This type of low-noise, access-preserving tool is especially concerning for organizations that rely on perimeter-based defenses.

Once RoadK1ll is active, attackers can reach internal databases, administrative interfaces, and segmented environments without ever crossing the outer perimeter again.

The infected machine stops being just a compromised endpoint; it becomes an attacker-controlled gateway into the broader network.

How RoadK1ll Uses a Custom WebSocket Protocol to Move Traffic

Rather than using standard tunneling tools or frameworks, RoadK1ll builds its own lightweight communication protocol on top of a single WebSocket connection.

Each message uses a fixed 5-byte header, with the first four bytes identifying the active channel and the fifth defining the message type, followed by the actual data payload.

Defining Custom Framing Protocol (Source – BlackPoint)

This structure allows the attacker to run multiple independent sessions over the same tunnel at once, without opening additional connections.

The implant imports two core Node.js modules: net for raw TCP socket handling and ws for managing the WebSocket session.

Importing the net and ws Modules (Source – BlackPoint)

Configuration values in the code define the remote server address, port number, and a shared token that acts as a basic authentication check.

A built-in reconnection timer automatically re-establishes the WebSocket tunnel if the connection drops, keeping the relay active without requiring any manual input from the attacker.

The implant supports five message types: DATA for forwarding traffic, CONNECT to open a new TCP connection to an internal target, CONNECTED to confirm a session is ready, CLOSE to end a channel, and ERROR to report failures back to the operator.

Defining message types for this custom protocol (Source – BlackPoint)

Together, these types give the attacker dynamic control over which internal systems the compromised host connects to, and all of this activity travels over standard outbound WebSocket traffic, making it difficult to flag with conventional monitoring tools alone.

Security teams should closely monitor endpoints for unexpected Node.js processes maintaining persistent outbound WebSocket connections to unfamiliar external addresses.

Outbound traffic to unknown IPs on non-standard ports should be reviewed and blocked where appropriate. Network segmentation controls should be regularly validated to ensure that a compromised host cannot freely reach sensitive internal services.

The known indicators of compromise for RoadK1ll include the file Index.js, SHA256 hash b5a3ace8dc6cc03a5d83b2d85904d6e1ee00d4167eb3d04d4fb4f793c9903b7e, and confirmed C2 IP address 45[.]63[.]39[.]209.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.