<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[How Criminals Can Exploit the Blockchain Name Space]]></title><description><![CDATA[<p>How Criminals Can Exploit the Blockchain Name Space</p><p>On March 19, Wired published an article on how the US Justice Department and law enforcement agencies of collaborating countries took down the command-and-control of several botnets that were used for a huge number of cyberattacks, such as Distributed Denial of Service attacks</p><p>In this article, Interisle's Andy Malis look at botnets generally and how they exploit the DNS. He thens looks at a variation of the conventional botnet exploitation of the DNS that leverages the name space for Ethereum blockchain.</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://interisle.substack.com/p/how-criminals-can-exploit-the-blockchain" title="How Criminals Can Exploit the Blockchain Name Space">
<img src="https://substackcdn.com/image/fetch/$s_!FjqL!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ade5f15-251b-4f57-bcb2-7bd9a50f00db_1024x1024.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://interisle.substack.com/p/how-criminals-can-exploit-the-blockchain">
How Criminals Can Exploit the Blockchain Name Space
</a>
</h5>
<p class="card-text line-clamp-3">Andy Malis</p>
</div>
<a href="https://interisle.substack.com/p/how-criminals-can-exploit-the-blockchain" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://substackcdn.com/icons/substack/icon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />







<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(interisle.substack.com)</span></p>
</a>
</div></p><p><a href="https://infosec.exchange/tags/botnet" rel="tag">#<span>botnet</span></a> <a href="https://infosec.exchange/tags/malware" rel="tag">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ethereum" rel="tag">#<span>ethereum</span></a> <a href="https://infosec.exchange/tags/ENS" rel="tag">#<span>ENS</span></a> <a href="https://infosec.exchange/tags/blockchain" rel="tag">#<span>blockchain</span></a> <a href="https://infosec.exchange/tags/DNS" rel="tag">#<span>DNS</span></a></p>

<div class="row mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/358/043/769/882/207/original/a8575767a38889a3.png" alt="Link Preview Image" /></div>]]></description><link>https://board.circlewithadot.net/topic/1531b50f-f49b-4d0a-a8dc-791728b4d31e/how-criminals-can-exploit-the-blockchain-name-space</link><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 10:57:10 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/1531b50f-f49b-4d0a-a8dc-791728b4d31e.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 06 Apr 2026 13:41:20 GMT</pubDate><ttl>60</ttl></channel></rss>