Malware Uses Ethereum Contract for C2

Updated: 2026.04.18 2H ago 1 sources
Attackers embedded a backdoor in widely installed WordPress plugins and made the malware’s command‑and‑control (C2) domain resolvable via an on‑chain pointer inside an Ethereum smart contract. Because the smart contract can be updated to point to new domains, traditional domain‑takedown responses are ineffective and incident responders must treat blockchains as persistent infrastructure in malware investigations. — Shows how blockchain features can be repurposed to evade existing cyber‑defense practices and highlights a governance gap in marketplace ownership transfers that enables large‑scale web compromises.

Sources

30 WordPress Plugins Turned Into Malware After Ownership Change
EditorDavid 2026.04.18 100% relevant
Austin Ginder’s investigation of the EssentialPlugin package found the C2 domain resolution was performed through an Ethereum smart contract and the plugin had been modified after a six‑figure acquisition.
← Back to All Ideas