Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

Posted on October 16, 2025October 16, 2025 By CWS

Oct 16, 2025Ravie LakshmananMalware / Blockchain
A risk actor with ties to the Democratic Individuals’s Republic of Korea (aka North Korea) has been noticed leveraging the EtherHiding method to distribute malware and allow cryptocurrency theft, marking the primary time a state-sponsored hacking group has embraced the strategy.
The exercise has been attributed by Google Risk Intelligence Group (GTIG) to a risk cluster it tracks as UNC5342, which is often known as CL-STA-0240 (Palo Alto Networks Unit 42), DeceptiveDevelopment (ESET), DEV#POPPER (Securonix), Well-known Chollima (CrowdStrike), Gwisin Gang (DTEX), Tenacious Pungsan (Datadog), and Void Dokkaebi (Development Micro).
The assault wave is a part of a long-running marketing campaign codenamed Contagious Interview, whereby the attackers strategy potential targets on LinkedIn by posing as recruiters or hiring managers, and trick them into operating malicious code below the pretext of a job evaluation after shifting the dialog to Telegram or Discord.
The tip purpose of those efforts is to realize unauthorized entry to builders’ machines, steal delicate information, and siphon cryptocurrency property – according to North Korea’s twin pursuit of cyber espionage and monetary achieve.
Google mentioned it has noticed UNC5342 incorporating EtherHiding – a stealthy strategy that includes embedding nefarious code inside a sensible contract on a public blockchain like BNB Sensible Chain (BSC) or Ethereum – since February 2025. In doing so, the assault turns the blockchain right into a decentralized lifeless drop resolver that is resilient to takedown efforts.

Moreover resilience, EtherHiding additionally abuses the pseudonymous nature of blockchain transactions to make it tougher to hint who has deployed the good contract. Complicating issues additional, the method can also be versatile in that it permits the attacker who’s in charge of the good contract to replace the malicious payload at any time (albeit costing a median of $1.37 in gasoline charges), thereby opening the door to a large spectrum of threats.

“This improvement indicators an escalation within the risk panorama, as nation-state risk actors at the moment are using new strategies to distribute malware that’s immune to legislation enforcement take-downs and will be simply modified for brand spanking new campaigns,” Robert Wallace, consulting chief at Mandiant, Google Cloud, mentioned in an announcement shared with The Hacker Information.

The an infection chain triggered following the social engineering assault is a multi-stage course of that is able to focusing on Home windows, macOS, and Linux techniques with three totally different malware households –

An preliminary downloader that manifests within the type of npm packages
BeaverTail, a JavaScript stealer that is liable for exfiltrating delicate data, reminiscent of cryptocurrency wallets, browser extension information, and credentials
JADESNOW, a JavaScript downloader that makes use of EtherHiding to fetch InvisibleFerret
InvisibleFerret, a Python backdoor deployed towards high-value targets to permit distant management of the compromised host, in addition to long-term information theft by focusing on MetaMask and Phantom wallets, in addition to credentials from password managers like 1Password

“EtherHiding represents a shift towards next-generation bulletproof internet hosting, the place the inherent options of blockchain expertise are repurposed for malicious ends,” Google mentioned. “This system underscores the continual evolution of cyber threats as attackers adapt and leverage new applied sciences to their benefit.”

The Hacker News Tags:Blockchain, Contracts, EtherHiding, Hackers, Hide, Korean, Malware, North, Smart

Post navigation

Previous Post: Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
Next Post: North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging

Related Posts

Beyond Vulnerability Management – Can You CVE What I CVE? The Hacker News
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU The Hacker News
ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent The Hacker News
Can Your Security Stack See ChatGPT? Why Network Visibility Matters The Hacker News
How to Gain Control of AI Agents and Non-Human Identities The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark