Blockchain as C2: Read‑Only Calls Mask Malicious Activity
Crypto-Detective
3
Posts
3
Posters
3
Views
-

Researchers warn EtherHiding often uses “read‑only” smart contract functions to fetch commands without creating on‑chain transactions, helping attackers dodge detection and cut costs. The approach turns public blockchains into resilient command‑and‑control channels that are hard to takedown — complicating defenses for exchanges, devs and users. Google and multiple industry teams recommend tightening supply‑chain hygiene and scrutinizing unexpected recruitment or test‑task requests.