Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

NK Hackers Hide Malware In Blockchain

October 17, 2025
Reading Time: 3 mins read
in Alerts
Sothebys Data Breach Exposes Customers

A hacking group with ties to North Korea has been identified as the first state-sponsored threat actor to adopt a stealthy new distribution method called EtherHiding to deploy malware and enable widespread cryptocurrency theft. This significant escalation in the cyber threat landscape has been attributed by the Google Threat Intelligence Group (GTIG) to a cluster they track as UNC5342. This group is also known across the industry by many other names, including Famous Chollima and Void Dokkaebi. Their activities align perfectly with North Korea’s dual goals of cyber espionage and financial gain through illicit means.

The hackers are executing this activity as part of a long-running social engineering campaign dubbed Contagious Interview. The attackers initially approach potential targets, typically software developers, on LinkedIn by posing as recruiters or hiring managers. They then steer the conversation to a private channel like Telegram or Discord and trick the victim into running malicious code disguised as a required job assessment or technical task. The ultimate objective is to gain unauthorized access to the developers’ systems, steal valuable intellectual property, and siphon off digital currency assets.

The core of this new wave of attacks is the incorporation of EtherHiding, a technique UNC5342 has been observed using since February 2025. This sophisticated method involves embedding malicious code within a legitimate-looking smart contract on a public blockchain, such as BNB Smart Chain (BSC) or Ethereum. By utilizing the blockchain, the attackers transform it into a decentralized “dead drop resolver,” which makes the malicious payload highly resilient to traditional law enforcement takedown efforts. Furthermore, the pseudonymous nature of blockchain transactions adds a layer of complexity, making it exceedingly difficult to trace the individuals who deployed the malicious smart contract in the first place.

The infection chain triggered by the initial social engineering attack is complex and targets a wide range of operating systems, including Windows, macOS, and Linux. After the initial JavaScript downloader is executed, it interacts with a malicious BSC smart contract to fetch a component called JADESNOW. This component then queries the transaction history of an Ethereum address to retrieve the final stage payload: InvisibleFerret. This is a JavaScript version of a backdoor designed for high-value targets, which allows for remote control of the compromised system and is specifically engineered to steal credentials and target cryptocurrency wallets like MetaMask and Phantom.

This aggressive shift to using EtherHiding represents what experts call a move toward “next-generation bulletproof hosting,” where the inherent features of blockchain technology—resilience, decentralization, and pseudonymity—are repurposed for malicious ends. This strategic evolution means threat actors can update their malicious payloads at any time, albeit for a small transaction cost, allowing them to remain agile and effective against a wide spectrum of targets. As one consulting leader noted, this development “signals an escalation in the threat landscape, as nation-state threat actors are now utilizing new techniques to distribute malware that is resistant to law enforcement take-downs.”

Reference:

  • North Korean Hackers Use Etherhiding To Conceal Malware In Blockchain Smart Contracts
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial