Threat Intelligence Insights: Pivoting off the Blockchain
Background “EtherHiding” is a technique that we keep seeing with increased popularity in the threat landscape. Threat actors store data (for example C2 configuration) or code on a public blockchain, where they face no risk of a takedown due to the decentralized nature. Additionally, by using smart contracts, they are also able to update theVMRayRead More