Criminals try to cover their tracks as best they can. This also includes hiding any activities that control the machines they have compromised. Using I2P is one way of doing that, but until recently this has rarely been used.
New I2PRAT communicates via anonymous peer-to-peer network
Submitted 2 days ago by Joker@sh.itjust.works to cybersecurity@infosec.pub
https://www.gdatasoftware.com/blog/2024/12/38093-ip2rat-malware