North Korean hackers embedded malware in Ethereum and BNB smart contracts

2025-10-22 15:46

North Korean hackers are using a new malware that can hide within blockchain smart contracts to stealthily siphon cryptocurrencies.

Dubbed EtherHiding, the malware has been active since at least September 2023, according to a recent report from Google’s Threat Intelligence Group. 

While it was previously spotted in financially motivated campaigns by cybercriminals, this is the first time researchers have observed a nation-state actor deploying it. 

In its latest findings, Google linked the malware’s use to UNC5342, a threat group associated with North Korea’s infamous hacking unit, FamousChollima.

Google’s researchers warned that EtherHiding introduces new challenges for defenders, since it bypasses traditional methods of neutralizing malicious campaigns. 

Unlike typical malware infrastructure, which can often be disrupted by blocking known IP addresses or taking down domains, smart contracts operate autonomously on blockchain networks and cannot be removed or altered once deployed. 

The team singled out both Ethereum and BNB Smart Chain as platforms where malicious code has already been embedded, allowing hackers to use these contracts as vehicles to distribute malware.

How does EtherHiding target crypto users?

According to researchers, EtherHiding functions by hiding code within public smart contracts, which can then be triggered via JavaScript planted on compromised WordPress websites. 

When a user visits one of these booby-trapped sites, a small loader script runs silently in their browser.

Subsequently, the script reaches out to the blockchain, without leaving any traces on-chain, since it uses read-only calls like eth_call, and pulls malicious instructions from the smart contract, which then redirect to attacker-controlled servers that deliver the full malware payload to the user’s device.

Because the interaction with the blockchain does not generate any transactions or incur gas fees, it leaves no typical indicators that security tools might look for.

Once the malware is executed, it can take various forms, ranging from fake login pages designed to harvest credentials to infostealers and even ransomware. 

And since the malware uses blockchain as a resilient backend, it makes it significantly harder to shut down the campaign once it is underway.

The implications are serious, especially given North Korea’s history of using cybercrime to fund its weapons programs and evade sanctions.

North Korean hackers have remained a consistent threat

Over the years, Pyongyang’s hacking units have developed a reputation for sophistication, deploying a wide range of social engineering tricks and malicious software to breach crypto platforms and financial institutions.

From posing as developers applying for jobs to infiltrate companies to tricking victims into joining fake podcast interviews, North Korean threat actors have consistently demonstrated patience and creativity in executing long-term infiltration campaigns.

In recent months, they have even resorted to outsourcing parts of their operations.

According to past reports, North Korean groups have begun hiring non-Korean individuals to act as fronts, helping them pass interviews and gain insider access to crypto firms.

But North Korea is not alone in turning to smart contracts for malicious purposes.

In a separate campaign uncovered earlier in 2025 by ReversingLabs, attackers were found using npm packages to load smart contracts on Ethereum, which in turn hosted URLs used to deliver second-stage payloads that target crypto users.

The post North Korean hackers embedded malware in Ethereum and BNB smart contracts appeared first on Invezz

origin »

North Korean Won (KPW) íà Currencies.ru

$ 0 (+0.00%)
Îáúåì 24H $0
Èçìåíåèÿ 24h: 0.00 %, 7d: 0.00 %
Cåãîäíÿ L: $0 - H: $0
Êàïèòàëèçàöèÿ $0 Rank 99999
Äîñòóïíî / Âñåãî 0 KPW

malware north immutability uses blockchain conceal code

malware north → Ðåçóëüòàòîâ: 51


FBI seizes crypto scam domain tied to North Korea’s Lazarus Group

Hackers posed as tech recruiters in fake job interviews. Malware used to steal crypto wallets and credentials. Front firms traced to addresses in South Carolina and Buffalo. North Korea’s covert cyberwarfare strategy has taken a new turn, with US federal investigators uncovering an elaborate crypto-related malware campaign run by front companies posing as legitimate tech […] The post FBI seizes crypto scam domain tied to North Korea’s Lazarus Group appeared first on CoinJournal.

2025-4-25 11:26


Ôîòî:

Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks

A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics.

2020-1-11 09:39


Kaspersky: Lazarus Hackers To Steal Crypto Using Telegram in ‘Operation AppleJesus Sequel’

The Moscow-based cybersecurity firm Kaspersky has informed cryptocurrency users that North Korean hackers have developed new ways of delivering malware through Telegram. Kaspersky has been looking at the latest attacks of the Lazarus Group, a North Korea-related cybercrime organization that has also conducted the AppleJesus attack on some of the most important crypto exchanges in […]

2020-1-10 22:16


Ôîòî:

New Malware Sheds Light on How Cryptocurrency Exchanges Get Hacked

Ever wondered how cryptocurrency exchanges get hacked? Well, a new malware attempt by a North Korean hacking group might reveal some of what goes into such an attack. The new malware operates under the guise of a client-side trading software called “JTM Trading Software” and appears to be operated by the infamous North Korean Lazarus […] The post New Malware Sheds Light on How Cryptocurrency Exchanges Get Hacked appeared first on BeInCrypto.

2019-10-16 08:17


Ôîòî:

North Korean Hackers Infiltrate Unnamed Crypto Exchange in First-Ever MacOS Hack

North Korea’s notorious cyber-hacking outfit, “Lazarus Group,” has reportedly deployed a MacOS-based malware to infiltrate cryptocurrency exchanges and applications, according to Kaspersky Labs. North Korean Attackers Strike To date, Lazarus remains an unknown entity, with no information on the number of individuals identifying with the outfit.

2018-8-25 07:00