North Korean Hackers Use EtherHiding for Malware, Crypto Theft

North Korean-Linked Hackers Use EtherHiding to Spread Malware and Steal Cryptocurrency via Blockchain Smart Contracts Targeting Developers

  • A North Korean-linked Hacking group has used the EtherHiding method to spread Malware and steal cryptocurrency.
  • The campaign targets developers on LinkedIn, then uses Telegram or Discord to deliver malicious code.
  • EtherHiding stores harmful code inside blockchain smart contracts, making it hard to remove or trace.
  • The attack affects Windows, macOS, and Linux with multiple malware families, including backdoors and data stealers.
  • This marks the first time a state-sponsored actor has employed EtherHiding, highlighting a shift in cyberattack techniques.

A threat group connected to North Korea has employed the EtherHiding technique to distribute malware and steal cryptocurrency. This activity, observed by the Google Threat Intelligence Group (GTIG), began in February 2025. The group, known in different security communities by names such as UNC5342 and Famous Chollima, targets developers through LinkedIn before moving conversations to platforms like Telegram or Discord to deploy malicious code.

- Advertisement -

The campaign, called Contagious Interview, aims to gain unauthorized access to developers’ devices, exfiltrate sensitive information, and illegally acquire cryptocurrency assets. EtherHiding works by embedding harmful code in blockchain smart contracts on networks like Ethereum or BNB Smart Chain. This lets the attackers use the blockchain as a decentralized dead drop resolver, a way to exchange data that is resistant to takedown or tracing efforts.

Google noted that EtherHiding makes use of the blockchain’s pseudonymous transactions to hide who deploys the contracts. The attackers can also update the malware at any time, paying an average blockchain fee of about $1.37. Robert Wallace, a consulting leader at Mandiant, Google Cloud, said in a statement, “This development signals an escalation in the threat landscape, as nation-state threat actors are now utilizing new techniques to distribute malware that is resistant to law enforcement take-downs and can be easily modified for new campaigns.”

Following social engineering steps, the infection targets Windows, macOS, and Linux using several malware types: an initial downloader disguised as npm packages, BeaverTail (a JavaScript stealer that collects cryptocurrency wallets and credentials), JADESNOW (a downloader using EtherHiding), and InvisibleFerret (a Python backdoor enabling remote access and persistent data theft). The backdoor specifically targets wallets like MetaMask and Phantom and password managers such as 1Password.

Google described EtherHiding as a move toward advanced bulletproof Hosting, where blockchain features are exploited for malicious purposes. This underscores ongoing cyber threat evolution as attackers adopt new technologies for their activities.

- Advertisement -

For more details, see the public report from the Google Threat Intelligence Group here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ripple’s XRP Now Partnered With Over 140 Banks Worldwide

Ripple's XRP bank partnerships now cover more than 140 financial institutions worldwide, including major...

Crypto Exchanges Bypass Russia Sanctions via Obfuscation

Russian-facing crypto exchanges continue to enable sanctions evasion by providing cross-border payment channels shielded...

Coinbase to Share USDC Reserve Revenue With Circle

Coinbase receives significant revenue from USDC reserves, including 50% of Circle’s “residual payment base.”SkyBridge...

Bitcoin Miner MARA Takes Majority Stake in French AI Firm Exaion

MARA Holdings completes its acquisition of a 64% majority stake in French infrastructure firm...

AI Stock Overvaluation Could Propel Bitcoin Higher: Analyst

Macro strategist Lyn Alden suggests Bitcoin's next major rally may depend on capital rotating...

Must Read

Top 9 VPNs That Accept Bitcoin And Crypto

CyberGhost | FastVPN | TorGuard | Private Internet Access | ExpressVPN | NordVPN | Private VPN | SurfShark | AirVPN | Why Buy VPN...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!