Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

NK Hackers Hide Malware In Blockchain

October 17, 2025
Reading Time: 3 mins read
in Alerts
Sothebys Data Breach Exposes Customers

A hacking group with ties to North Korea has been identified as the first state-sponsored threat actor to adopt a stealthy new distribution method called EtherHiding to deploy malware and enable widespread cryptocurrency theft. This significant escalation in the cyber threat landscape has been attributed by the Google Threat Intelligence Group (GTIG) to a cluster they track as UNC5342. This group is also known across the industry by many other names, including Famous Chollima and Void Dokkaebi. Their activities align perfectly with North Korea’s dual goals of cyber espionage and financial gain through illicit means.

The hackers are executing this activity as part of a long-running social engineering campaign dubbed Contagious Interview. The attackers initially approach potential targets, typically software developers, on LinkedIn by posing as recruiters or hiring managers. They then steer the conversation to a private channel like Telegram or Discord and trick the victim into running malicious code disguised as a required job assessment or technical task. The ultimate objective is to gain unauthorized access to the developers’ systems, steal valuable intellectual property, and siphon off digital currency assets.

The core of this new wave of attacks is the incorporation of EtherHiding, a technique UNC5342 has been observed using since February 2025. This sophisticated method involves embedding malicious code within a legitimate-looking smart contract on a public blockchain, such as BNB Smart Chain (BSC) or Ethereum. By utilizing the blockchain, the attackers transform it into a decentralized “dead drop resolver,” which makes the malicious payload highly resilient to traditional law enforcement takedown efforts. Furthermore, the pseudonymous nature of blockchain transactions adds a layer of complexity, making it exceedingly difficult to trace the individuals who deployed the malicious smart contract in the first place.

The infection chain triggered by the initial social engineering attack is complex and targets a wide range of operating systems, including Windows, macOS, and Linux. After the initial JavaScript downloader is executed, it interacts with a malicious BSC smart contract to fetch a component called JADESNOW. This component then queries the transaction history of an Ethereum address to retrieve the final stage payload: InvisibleFerret. This is a JavaScript version of a backdoor designed for high-value targets, which allows for remote control of the compromised system and is specifically engineered to steal credentials and target cryptocurrency wallets like MetaMask and Phantom.

This aggressive shift to using EtherHiding represents what experts call a move toward “next-generation bulletproof hosting,” where the inherent features of blockchain technology—resilience, decentralization, and pseudonymity—are repurposed for malicious ends. This strategic evolution means threat actors can update their malicious payloads at any time, albeit for a small transaction cost, allowing them to remain agile and effective against a wide spectrum of targets. As one consulting leader noted, this development “signals an escalation in the threat landscape, as nation-state threat actors are now utilizing new techniques to distribute malware that is resistant to law enforcement take-downs.”

Reference:

  • North Korean Hackers Use Etherhiding To Conceal Malware In Blockchain Smart Contracts
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Sothebys Data Breach Exposes Customers

Microsoft Pulls 200 Suspicious Certificates

October 17, 2025
Sothebys Data Breach Exposes Customers

Hackers Spread Malware With Blockchain

October 17, 2025

Fortinet And Ivanti Patch Severe Flaws

October 16, 2025

Malicious VSCode Extensions Steal Crypto

October 16, 2025

Fake Password Manager Hijack PCs

October 16, 2025
Android Flaw Lets Apps Steal 2FA Codes

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025

Latest Alerts

Microsoft Pulls 200 Suspicious Certificates

NK Hackers Hide Malware In Blockchain

Hackers Spread Malware With Blockchain

Fortinet And Ivanti Patch Severe Flaws

Malicious VSCode Extensions Steal Crypto

Fake Password Manager Hijack PCs

Subscribe to our newsletter

    Latest Incidents

    Pro Hamas Hackers Target Airport Speakers

    Prosper Breach Hits 17 Million Accounts

    Sothebys Data Breach Exposes Customers

    F5 Reports Hackers Stole Source Code

    YouTube Down Globally With Playback Errors

    Spanish Retailer Mango Discloses Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial