The post North Korean hackers hide crypto-theft malware inside smart contracts appeared on BitcoinEthereumNews.com. North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their crypto theft operations. According to experts, a North Korean hacker was discovered using this method, where attackers embed codes like JavaScript Payloads inside a blockchain-based smart contract. Using the method, the hackers turn the decentralized ledger into a resilient command-and-control (C2). According to a published blog post by Google Threat Intelligence Group (GTIG), this is the first time that it has observed an actor of this scale using this method. It claimed that using EtherHiding is convenient in the face of conventional takedown and blocklisting efforts. The threat intelligence group mentioned that it has been tracking threat actor UNC5342 since February 2025, integrating EtherHiding into an ongoing social engineering campaign. North Korean hackers turn to EtherHiding Google mentioned that it has linked the usage of EtherHiding to a social engineering campaign tracked by Palo Alto Networks as Contagious Interview. The Contagious Interview was carried out by North Korean actors. According to Socket researchers, the group expanded its operation with a new malware loader, XORIndex. The loader has accumulated thousands of downloads, with the targets being job seekers and individuals believed to own digital assets or sensitive credentials. In this campaign, the North Korean hackers use JADESNOW malware to distribute a JavaScript variant of INVISIBLEFERRET, which has been used to carry out so many cryptocurrency thefts. The campaign targets developers in the crypto and technology industries, stealing sensitive data, digital assets, and gaining access to corporate networks. It also centers around a social engineering tactic that copies legitimate recruitment processes using fake recruiters and fabricated companies. Fake recruiters are used to lure candidates to platforms like Telegram or Discord. After that, the malware is then delivered to their systems and devices through fake… The post North Korean hackers hide crypto-theft malware inside smart contracts appeared on BitcoinEthereumNews.com. North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their crypto theft operations. According to experts, a North Korean hacker was discovered using this method, where attackers embed codes like JavaScript Payloads inside a blockchain-based smart contract. Using the method, the hackers turn the decentralized ledger into a resilient command-and-control (C2). According to a published blog post by Google Threat Intelligence Group (GTIG), this is the first time that it has observed an actor of this scale using this method. It claimed that using EtherHiding is convenient in the face of conventional takedown and blocklisting efforts. The threat intelligence group mentioned that it has been tracking threat actor UNC5342 since February 2025, integrating EtherHiding into an ongoing social engineering campaign. North Korean hackers turn to EtherHiding Google mentioned that it has linked the usage of EtherHiding to a social engineering campaign tracked by Palo Alto Networks as Contagious Interview. The Contagious Interview was carried out by North Korean actors. According to Socket researchers, the group expanded its operation with a new malware loader, XORIndex. The loader has accumulated thousands of downloads, with the targets being job seekers and individuals believed to own digital assets or sensitive credentials. In this campaign, the North Korean hackers use JADESNOW malware to distribute a JavaScript variant of INVISIBLEFERRET, which has been used to carry out so many cryptocurrency thefts. The campaign targets developers in the crypto and technology industries, stealing sensitive data, digital assets, and gaining access to corporate networks. It also centers around a social engineering tactic that copies legitimate recruitment processes using fake recruiters and fabricated companies. Fake recruiters are used to lure candidates to platforms like Telegram or Discord. After that, the malware is then delivered to their systems and devices through fake…

North Korean hackers hide crypto-theft malware inside smart contracts

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

North Korean hackers are now using a blockchain-based method known as EtherHiding to deliver malware to facilitate their crypto theft operations. According to experts, a North Korean hacker was discovered using this method, where attackers embed codes like JavaScript Payloads inside a blockchain-based smart contract.

Using the method, the hackers turn the decentralized ledger into a resilient command-and-control (C2). According to a published blog post by Google Threat Intelligence Group (GTIG), this is the first time that it has observed an actor of this scale using this method. It claimed that using EtherHiding is convenient in the face of conventional takedown and blocklisting efforts. The threat intelligence group mentioned that it has been tracking threat actor UNC5342 since February 2025, integrating EtherHiding into an ongoing social engineering campaign.

North Korean hackers turn to EtherHiding

Google mentioned that it has linked the usage of EtherHiding to a social engineering campaign tracked by Palo Alto Networks as Contagious Interview. The Contagious Interview was carried out by North Korean actors. According to Socket researchers, the group expanded its operation with a new malware loader, XORIndex. The loader has accumulated thousands of downloads, with the targets being job seekers and individuals believed to own digital assets or sensitive credentials.

In this campaign, the North Korean hackers use JADESNOW malware to distribute a JavaScript variant of INVISIBLEFERRET, which has been used to carry out so many cryptocurrency thefts. The campaign targets developers in the crypto and technology industries, stealing sensitive data, digital assets, and gaining access to corporate networks. It also centers around a social engineering tactic that copies legitimate recruitment processes using fake recruiters and fabricated companies.

Fake recruiters are used to lure candidates to platforms like Telegram or Discord. After that, the malware is then delivered to their systems and devices through fake coding tests or software downloads disguised as technical assessments or interview fixes. The campaign uses a multi-stage malware infection process, which usually involves malware like JADESNOW, INVISIBLEFERRET, and BEAVERTAIL, to compromise the victim’s devices. The malware affects Windows, Linux, and macOS systems.

Researchers detail the cons of EtherHiding

EtherHiding provides a better advantage to attackers, with GTIG noting that it acts as a particularly challenging threat to mitigate. One core element of EtherHiding that is concerning is that it is decentralized in nature. This means that it is stored on a permissionless and decentralized blockchain, making it hard for law enforcement or cybersecurity firms to take it down because it has no central server. The identity of the attacker is also hard to track because of the pseudonymous nature of blockchain transactions.

It is also hard to remove malicious code in smart contracts deployed on the blockchain if you are not the owner of the contract. The attacker in control of the smart contract, in this case, the North Korean hackers, can also choose to update the malicious payload at any time. While security researchers may try to warn the community about a malicious contract by tagging it, it doesn’t stop hackers from carrying out their malicious activities using the smart contract.

In addition, attackers can retrieve their malicious payload using read-only calls that do not leave a visible transaction history on the blockchain, making it hard for researchers to track their activities on the blockchain. According to the threat research report, EtherHiding represents a “shift towards next-generation bulletproof hosting” where the most glaring features of blockchain technology are being used by scammers for malicious purposes.

Join a premium crypto trading community free for 30 days – normally $100/mo.

Source: https://www.cryptopolitan.com/north-korean-hackers-crypto-stealing-malware/

Market Opportunity
Smart Blockchain Logo
Smart Blockchain Price(SMART)
$0.004181
$0.004181$0.004181
-1.25%
USD
Smart Blockchain (SMART) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Solana (SOL) Positions for Breakout as Market Sentiment Turns Bullish

Solana (SOL) Positions for Breakout as Market Sentiment Turns Bullish

The post Solana (SOL) Positions for Breakout as Market Sentiment Turns Bullish appeared on BitcoinEthereumNews.com. Aayush Jindal, a luminary in the world of financial
Share
BitcoinEthereumNews2026/03/03 13:31
South Africa port reform accelerates investment

South Africa port reform accelerates investment

South Africa port reform is entering a decisive phase as structural changes at Transnet aim to unlock investment and strengthen trade competitiveness. Transnet
Share
Furtherafrica2026/03/03 13:00
BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline

BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline

The post BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline appeared on BitcoinEthereumNews.com. Crypto News 20 September 2025 | 00:00 Discover why BlockDAG’s $0.0013 entry is making headlines with nearly $410M raised, 26.3B coins sold, and the limited-time entry closing on Oct 1st. Occasionally, a single figure captures attention across crypto. This time, it isn’t a projection or a chart setup; it is a presale entry point. The $0.0013 price lock from BlockDAG (BDAG) has become more than a presale detail. It represents a marker of timing, reliability, and measurable progress. With more than 26.3 billion coins sold and nearly $410 million already secured, this price is not a teaser. It is a structured offer that continues to attract participants in large numbers. Once October 1st passes, the $0.0013 entry will close, and its significance could be remembered as one of those rare early-stage milestones. The $0.0013 Window Reflects More Than a Temporary Offer Many presales are defined by uncertainty, often shifting timelines and unclear goals. By fixing its presale price at $0.0013 until October 1st, BlockDAG has created a point of clarity in a crowded market. It is less about a discount and more about a defined statement: the project is setting a clear cut-off for early access. This approach has shown results. Over 26.3 billion BDAG coins have already been purchased. That momentum stems from demonstrated progress, not just speculation. A live Testnet, close to 20,000 miners distributed, and more than 3 million daily users of the X1 mobile miner all point to activity happening now rather than deferred promises. On top of this, the return profile is notable. The current batch price is $0.03, while the $0.0013 entry remains open for a limited time. That gap means an ROI of about 2,900% compared with batch 1. Even so, the project is keeping the entry level steady until October 1st, providing…
Share
BitcoinEthereumNews2025/09/20 06:25