The use of blockchain communication for malware command and control (C2) is restricted by its inherent slowness and public accessibility, which may deter widespread adoption.
Despite its theoretical advantages, the application of blockchains in malware C2 remains experimental, mainly utilized by specialists due to challenges in blocking or editing the communications.
Targeting testing tools through NPM exposes vulnerabilities in developer environments, providing attackers with greater access to CI/CD pipelines that could be exploited.
While blockchain offers a less straightforward target for C2 systems, its public nature allows tracking once identified, limiting its effectiveness for malware purposes.
Collection
[
|
...
]