Topic: decentralized c2
-
North Korean Hackers' New EtherHiding Crypto Heist
A North Korean hacking group is using EtherHiding, a blockchain-based method that embeds malware in smart contracts, making the blockchain a resilient command-and-control server for malicious activities. EtherHiding resists traditional cybersecurity measures because it operates on a decentralized...
Read More »