The post XRP, other crypto assets targeted in EtherHiding attack appeared on BitcoinEthereumNews.com. North Korean threat actors have adopted a blockchain-based technique called EtherHiding to deliver malware designed to steal cryptocurrency including XRP. Summary Hackers embed malicious code in smart contracts to steal XRP and other crypto. EtherHiding evades takedowns by hosting malware on decentralized blockchains. Fake recruiters trick developers into installing malware during job interviews. According to Google’s Threat Intelligence Group, this is the first time GTIG has observed a nation-state actor using this method. The method embeds malicious JavaScript payloads inside blockchain smart contracts to create resilient command-and-control servers. The EtherHiding technique targets developers in cryptocurrency and technology sectors through social engineering campaigns tracked as “Contagious Interview.” The campaign has led to numerous cryptocurrency heists affecting XRP (XRP) holders and users of other digital assets. Blockchain-based attack infrastructure evades detection EtherHiding stores malicious code on decentralized and permissionless blockchains and removes central servers that law enforcement or cybersecurity firms can take down. Attackers controlling smart contracts can update malicious payloads at any time and maintain persistent access to compromised systems. Security researchers can tag contracts as malicious on blockchain scanners like BscScan, but malicious activity continues regardless of these warnings. Google’s report describes EtherHiding as a “shift towards next-generation bulletproof hosting” where blockchain technology features enable malicious purposes. When users interact with compromised sites, the code activates to steal XRP, other cryptocurrencies, and sensitive data. The compromised websites communicate with blockchain networks using read-only functions that avoid creating ledger transactions. This minimizes detection and transaction fees. Sophisticated social engineering The Contagious Interview campaign centers on social engineering tactics that mimicks legitimate recruitment processes through fake recruiters and fabricated companies. Fake recruiters lure candidates onto platforms like Telegram or Discord, then deliver malware through deceptive coding tests or fake software downloads disguised as technical assessments. The campaign employs multi-stage malware infection, including… The post XRP, other crypto assets targeted in EtherHiding attack appeared on BitcoinEthereumNews.com. North Korean threat actors have adopted a blockchain-based technique called EtherHiding to deliver malware designed to steal cryptocurrency including XRP. Summary Hackers embed malicious code in smart contracts to steal XRP and other crypto. EtherHiding evades takedowns by hosting malware on decentralized blockchains. Fake recruiters trick developers into installing malware during job interviews. According to Google’s Threat Intelligence Group, this is the first time GTIG has observed a nation-state actor using this method. The method embeds malicious JavaScript payloads inside blockchain smart contracts to create resilient command-and-control servers. The EtherHiding technique targets developers in cryptocurrency and technology sectors through social engineering campaigns tracked as “Contagious Interview.” The campaign has led to numerous cryptocurrency heists affecting XRP (XRP) holders and users of other digital assets. Blockchain-based attack infrastructure evades detection EtherHiding stores malicious code on decentralized and permissionless blockchains and removes central servers that law enforcement or cybersecurity firms can take down. Attackers controlling smart contracts can update malicious payloads at any time and maintain persistent access to compromised systems. Security researchers can tag contracts as malicious on blockchain scanners like BscScan, but malicious activity continues regardless of these warnings. Google’s report describes EtherHiding as a “shift towards next-generation bulletproof hosting” where blockchain technology features enable malicious purposes. When users interact with compromised sites, the code activates to steal XRP, other cryptocurrencies, and sensitive data. The compromised websites communicate with blockchain networks using read-only functions that avoid creating ledger transactions. This minimizes detection and transaction fees. Sophisticated social engineering The Contagious Interview campaign centers on social engineering tactics that mimicks legitimate recruitment processes through fake recruiters and fabricated companies. Fake recruiters lure candidates onto platforms like Telegram or Discord, then deliver malware through deceptive coding tests or fake software downloads disguised as technical assessments. The campaign employs multi-stage malware infection, including…

XRP, other crypto assets targeted in EtherHiding attack

2025/10/19 01:01

North Korean threat actors have adopted a blockchain-based technique called EtherHiding to deliver malware designed to steal cryptocurrency including XRP.

Summary

  • Hackers embed malicious code in smart contracts to steal XRP and other crypto.
  • EtherHiding evades takedowns by hosting malware on decentralized blockchains.
  • Fake recruiters trick developers into installing malware during job interviews.

According to Google’s Threat Intelligence Group, this is the first time GTIG has observed a nation-state actor using this method.

The method embeds malicious JavaScript payloads inside blockchain smart contracts to create resilient command-and-control servers.

The EtherHiding technique targets developers in cryptocurrency and technology sectors through social engineering campaigns tracked as “Contagious Interview.”

The campaign has led to numerous cryptocurrency heists affecting XRP (XRP) holders and users of other digital assets.

Blockchain-based attack infrastructure evades detection

EtherHiding stores malicious code on decentralized and permissionless blockchains and removes central servers that law enforcement or cybersecurity firms can take down.

Attackers controlling smart contracts can update malicious payloads at any time and maintain persistent access to compromised systems.

Security researchers can tag contracts as malicious on blockchain scanners like BscScan, but malicious activity continues regardless of these warnings.

Google’s report describes EtherHiding as a “shift towards next-generation bulletproof hosting” where blockchain technology features enable malicious purposes.

When users interact with compromised sites, the code activates to steal XRP, other cryptocurrencies, and sensitive data.

The compromised websites communicate with blockchain networks using read-only functions that avoid creating ledger transactions. This minimizes detection and transaction fees.

Sophisticated social engineering

The Contagious Interview campaign centers on social engineering tactics that mimicks legitimate recruitment processes through fake recruiters and fabricated companies.

Fake recruiters lure candidates onto platforms like Telegram or Discord, then deliver malware through deceptive coding tests or fake software downloads disguised as technical assessments.

The campaign employs multi-stage malware infection, including JADESNOW, BEAVERTAIL, and INVISIBLEFERRET variants affecting Windows, macOS, and Linux systems.

Victims believe they’re participating in legitimate job interviews while unknowingly downloading malware designed to gain persistent access to corporate networks and steal cryptocurrency holdings.

Source: https://crypto.news/xrp-crypto-assets-targeted-etherhiding-attack/

Market Opportunity
XRP Logo
XRP Price(XRP)
$1.8853
$1.8853$1.8853
-2.10%
USD
XRP (XRP) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

The post CEO Sandeep Nailwal Shared Highlights About RWA on Polygon appeared on BitcoinEthereumNews.com. Polygon CEO Sandeep Nailwal highlighted Polygon’s lead in global bonds, Spiko US T-Bill, and Spiko Euro T-Bill. Polygon published an X post to share that its roadmap to GigaGas was still scaling. Sentiments around POL price were last seen to be bearish. Polygon CEO Sandeep Nailwal shared key pointers from the Dune and RWA.xyz report. These pertain to highlights about RWA on Polygon. Simultaneously, Polygon underlined its roadmap towards GigaGas. Sentiments around POL price were last seen fumbling under bearish emotions. Polygon CEO Sandeep Nailwal on Polygon RWA CEO Sandeep Nailwal highlighted three key points from the Dune and RWA.xyz report. The Chief Executive of Polygon maintained that Polygon PoS was hosting RWA TVL worth $1.13 billion across 269 assets plus 2,900 holders. Nailwal confirmed from the report that RWA was happening on Polygon. The Dune and https://t.co/W6WSFlHoQF report on RWA is out and it shows that RWA is happening on Polygon. Here are a few highlights: – Leading in Global Bonds: Polygon holds 62% share of tokenized global bonds (driven by Spiko’s euro MMF and Cashlink euro issues) – Spiko U.S.… — Sandeep | CEO, Polygon Foundation (※,※) (@sandeepnailwal) September 17, 2025 The X post published by Polygon CEO Sandeep Nailwal underlined that the ecosystem was leading in global bonds by holding a 62% share of tokenized global bonds. He further highlighted that Polygon was leading with Spiko US T-Bill at approximately 29% share of TVL along with Ethereum, adding that the ecosystem had more than 50% share in the number of holders. Finally, Sandeep highlighted from the report that there was a strong adoption for Spiko Euro T-Bill with 38% share of TVL. He added that 68% of returns were on Polygon across all the chains. Polygon Roadmap to GigaGas In a different update from Polygon, the community…
Share
BitcoinEthereumNews2025/09/18 01:10
Major Ethereum Whale Returns: Buys $119M In ETH Amid Market Drop

Major Ethereum Whale Returns: Buys $119M In ETH Amid Market Drop

Ethereum is struggling to regain momentum after failing to reclaim the $3,200 level, keeping the market in a fragile equilibrium. Despite several recovery attempts
Share
Bitcoinist2025/12/16 04:00
Terra Founder Do Kwon May Face South Korean Trial Despite 15-Year US Prison Sentence

Terra Founder Do Kwon May Face South Korean Trial Despite 15-Year US Prison Sentence

The post Terra Founder Do Kwon May Face South Korean Trial Despite 15-Year US Prison Sentence appeared on BitcoinEthereumNews.com. In brief Do Kwon could face a
Share
BitcoinEthereumNews2025/12/16 03:46