This blog covers the growing trend of cyber criminals using blockchain domains for malicious infrastructure. Blockchain Infrastructure Use Traditionally, cyber criminals have used various methods to obfuscate malicious infrastructure that they use to host additional payloads, store stolen data, and/or function as command and control (C2) servers.
Read full news article on FireEye Blog