Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

Posted on October 16, 2025October 16, 2025 By CWS

A financially motivated menace actor codenamed UNC5142 has been noticed abusing blockchain sensible contracts as a strategy to facilitate the distribution of knowledge stealers similar to Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, focusing on each Home windows and Apple macOS methods.
“UNC5142 is characterised by its use of compromised WordPress web sites and ‘EtherHiding,’ a method used to obscure malicious code or information by inserting it on a public blockchain, such because the BNB Good Chain,” Google Risk Intelligence Group (GTIG) stated in a report shared with The Hacker Information.
As of June 2025, Google stated it flagged about 14,000 internet pages containing injected JavaScript that exhibit conduct related to an UNC5142, indicating indiscriminate focusing on of weak WordPress websites. Nevertheless, the tech large famous that it has not noticed any UNC5142 exercise since July 23, 2025, both signaling a pause or an operational pivot.
EtherHiding was first documented by Guardio Labs in October 2023, when it detailed assaults that concerned serving malicious code by using Binance’s Good Chain (BSC) contracts through contaminated websites serving faux browser replace warnings.

An important facet that underpins the assault chains is a multi-stage JavaScript downloader dubbed CLEARSHORT that permits the distribution of the malware through the hacked websites. The primary stage is a JavaScript malware that is inserted into the web sites to retrieve the second-stage by interacting with a malicious sensible contract saved on the BNB Good Chain (BSC) blockchain. The primary stage malware is added to plugin-related information, theme information, and, in some circumstances, even immediately into the WordPress database.
The sensible contract, for its half, is answerable for fetching a CLEARSHORT touchdown web page from an exterior server that, in flip, employs the ClickFix social engineering tactic to deceive victims into working malicious instructions on the Home windows Run dialog (or the Terminal app on Macs), in the end infecting the system with stealer malware. The touchdown pages, sometimes hosted on a Cloudflare .dev web page, are retrieved in an encrypted format as of December 2024.

On Home windows methods, the malicious command entails the execution of an HTML Software (HTA) file downloaded from a MediaFire URL, which then drops a PowerShell script to sidestep defenses, fetch the encrypted ultimate payload from both GitHub or MediaFire, or their very own infrastructure in some circumstances, and run the stealer immediately in reminiscence with out writing the artifact to disk.
In assaults focusing on macOS in February and April 2025, the attackers have been discovered to make the most of ClickFix decoys to immediate the consumer to run a bash command on Terminal that retrieved a shell script. The script subsequently makes use of the curl command to acquire the Atomic Stealer payload from the distant server.

CLEARSHORT is assessed to be a variant of ClearFake, which was the topic of an intensive evaluation by French cybersecurity firm Sekoia in March 2025. ClearFake is a rogue JavaScript framework deployed on compromised web sites to ship malware via the drive-by obtain method. It is identified to be energetic since July 2023, with the assaults adopting ClickFix round Could 2024.
The abuse of blockchain affords a number of benefits, because the intelligent method not solely blends in with authentic Web3 exercise, but additionally will increase the resiliency of UNC5142’s operations in opposition to detection and takedown efforts.
Google stated the menace actor’s campaigns have witnessed appreciable evolution over the previous yr, shifting from a single-contract system to a extra subtle three-smart contract system starting in November 2024 for higher operational agility, with additional refinements noticed earlier this January.
“This new structure is an adaptation of a authentic software program design precept generally known as the proxy sample, which builders use to make their contracts upgradable,” it defined.

“The setup capabilities as a extremely environment friendly Router-Logic-Storage structure the place every contract has a particular job. This design permits for speedy updates to vital components of the assault, such because the touchdown web page URL or decryption key, with none want to change the JavaScript on compromised web sites. In consequence, the campaigns are rather more agile and immune to takedowns.”
UNC5142’s accomplishes this by making the most of the mutable nature of a sensible contract’s information (it is price noting that this system code is immutable as soon as it is deployed) to change the payload URL, costing them anyplace between $0.25 and $1.50 in community charges to carry out these updates.

Additional evaluation has decided the menace actor’s use of two distinct units of sensible contract infrastructures to ship stealer malware through the CLEARSHORT downloader. The Foremost infrastructure is claimed to have been created on November 24, 2024, whereas the parallel Secondary infrastructure was funded on February 18, 2025.
“The Foremost infrastructure stands out because the core marketing campaign infrastructure, marked by its early creation and regular stream of updates,” GTIG stated. “The Secondary infrastructure seems as a parallel, extra tactical deployment, seemingly established to help a particular surge in marketing campaign exercise, take a look at new lures, or just construct operational resilience.”
“Given the frequent updates to the an infection chain coupled with the constant operational tempo, excessive quantity of compromised web sites, and variety of distributed malware payloads over the previous yr and a half, it’s seemingly that UNC5142 has skilled some degree of success with their operations.”

The Hacker News Tags:Abuse, Blockchain, Contracts, Hackers, Infected, Malware, Sites, Smart, Spread, WordPress

Post navigation

Previous Post: Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
Next Post: North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

Related Posts

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom The Hacker News
RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer The Hacker News
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager The Hacker News
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News
Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit The Hacker News
UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
  • Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
  • Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News