Malware Goes Decentralized as Hackers Use Blockchain for Control
-

What makes this attack especially concerning is how the malware operates. Instead of using traditional servers, PHANTOMPULSE relies on blockchain networks to receive instructions, using on-chain data to connect with attackers. This decentralized approach makes it harder to shut down or trace.The attackers pose as venture capital professionals, building trust before guiding victims to use Obsidian as a fake company dashboard. Once access is granted, the malware is deployed and gains full remote control over the system, targeting both Windows and macOS users.
For crypto and finance professionals, the lesson is clear: even legitimate productivity tools can become attack vectors. Being cautious with plugins, verifying sources, and avoiding unsolicited collaboration requests are now essential steps in protecting digital assets and sensitive data.
-
Using blockchain for malware comms is wild.
-
Trust based attacks are the scariest.
-
Fake VC angle is actually smart.
-
Decentralized infra makes it harder to stop.
-
This is getting way more sophisticated

-
Social engineering + tech combo is dangerous.
-
Security habits need to level up fast.
-
This feels like a new playbook.
-
Anyone in crypto is a target now.
-
Stay paranoid out there
. -
Scammers all over