| Description: | | Bitcoin protocol traffic has been observed on the network. The protocol is designed for peer-to-peer exchange of blocks, transactions and address information; adversaries abuse its decentralized, encrypted and pseudonymous nature to smuggle malicious payloads, C2 directives or exfiltrated data inside otherwise legitimate messages, evading conventional inspection. They may also poison mempools, spoof handshake packets or launch eclipse attacks to disrupt consensus, enabling double-spending, hash-rate hijacking or chain splits that endanger digital assets and operational continuity. |