Topic: decentralized c2

  • North Korean Hackers' New EtherHiding Crypto Heist

    North Korean Hackers' New EtherHiding Crypto Heist

    A North Korean hacking group is using EtherHiding, a blockchain-based method that embeds malware in smart contracts, making the blockchain a resilient command-and-control server for malicious activities. EtherHiding resists traditional cybersecurity measures because it operates on a decentralized...

    Read More »