Hackers using a blockchain as the Command & Control (C2) mechanism to communicate with infected hosts within a target company's network, creating a very resilient and stealthy way for them to send commands to their compromised machines that's almost impossible to stop.
After all, if we can store silly JPG images on the bitcoin blockchain, posting bot commands is easy and would give a real incentive to start blocking TCP ports often used by certain blockchains. (8333 for example) #cybersec #infosec #crime
https://www.darkreading.com/cloud-security/nkabuse-malware-blockchain-hide-linux-iot