Blockchain as a Malware Command Network
-

Google’s Threat Intelligence Group uncovered UNC5342 using a malware called EtherHiding, which stores malicious JavaScript payloads on a public blockchain.This technique acts as a decentralized command-and-control network, allowing attackers to update malware remotely while evading traditional defenses. The malware was deployed in the “Contagious Interview” social engineering campaign, targeting professionals in crypto and cybersecurity sectors.
-
Security firms need blockchain-level visibility now — attackers are leveraging on-chain anonymity as an advantage.