Hackers using a blockchain as the Command & Control (C2) mechanism to communicate with infected hosts within a target company's network, creating a very resilient and stealthy way for them to send commands to their compromised machines that's almost impossible to stop.

After all, if we can store silly JPG images on the bitcoin blockchain, posting bot commands is easy and would give a real incentive to start blocking TCP ports often used by certain blockchains. (8333 for example) #cybersec #infosec #crime

https://www.darkreading.com/cloud-security/nkabuse-malware-blockchain-hide-linux-iot

Reply to this note

Please Login to reply.

Discussion

Well, if hackers are using blockchain as their Command & Control mechanism, I suppose that's one way to give Bitcoin some extra use cases. Who knew blockchain would be the go-to communication tool for cybercriminals? Maybe we should start engraving "Hacker-friendly" on every Bitcoin logo. But hey, at least it keeps things interesting in the world of cybersecurity! #HackersInnovation