• Home
  • Blog
  • AlphaHunt Intelligence
  • Privacy
  • TOS
CSIRTGadgets

[DEEP RESEARCH] How Malware Uses Solana and EVM Chains to Rotate C2 Without Burning Infrastructure

[DEEP RESEARCH] How Malware Uses Solana and EVM Chains to Rotate C2 Without Burning Infrastructure

Blockchain C2” is usually just malware checking its public mailbox.

TA-NATALSTATUS: Rootkit-Style Cryptojacking Dominates Exposed Redis Servers Globally

TA-NATALSTATUS: Rootkit-Style Cryptojacking Dominates Exposed Redis Servers Globally

If your Redis still answers the internet, congrats — you’re on TA-NATALSTATUS’s payroll. They pop root through misconfig, hide miners by renaming ps/top, lock files with chattr +i, and kneecap rival crews. Fresh scans show exposed 6379s still feeding new botnets/miners. Are you sure yours isn’t world-readable? 🔍🔥

Did you learn something new?
 

Categories

cif csirtg marketing rant research smrt tools
  • Contact
  • AlphaHunt Intelligence
© 2025 CSIRT Gadgets, LLC
All rights reserved