North Korean Hackers Use EtherHiding for Malware, Crypto Theft

North Korean-Linked Hackers Use EtherHiding to Spread Malware and Steal Cryptocurrency via Blockchain Smart Contracts Targeting Developers

  • A North Korean-linked Hacking group has used the EtherHiding method to spread Malware and steal cryptocurrency.
  • The campaign targets developers on LinkedIn, then uses Telegram or Discord to deliver malicious code.
  • EtherHiding stores harmful code inside blockchain smart contracts, making it hard to remove or trace.
  • The attack affects Windows, macOS, and Linux with multiple malware families, including backdoors and data stealers.
  • This marks the first time a state-sponsored actor has employed EtherHiding, highlighting a shift in cyberattack techniques.

A threat group connected to North Korea has employed the EtherHiding technique to distribute malware and steal cryptocurrency. This activity, observed by the Google Threat Intelligence Group (GTIG), began in February 2025. The group, known in different security communities by names such as UNC5342 and Famous Chollima, targets developers through LinkedIn before moving conversations to platforms like Telegram or Discord to deploy malicious code.

- Advertisement -

The campaign, called Contagious Interview, aims to gain unauthorized access to developers’ devices, exfiltrate sensitive information, and illegally acquire cryptocurrency assets. EtherHiding works by embedding harmful code in blockchain smart contracts on networks like Ethereum or BNB Smart Chain. This lets the attackers use the blockchain as a decentralized dead drop resolver, a way to exchange data that is resistant to takedown or tracing efforts.

Google noted that EtherHiding makes use of the blockchain’s pseudonymous transactions to hide who deploys the contracts. The attackers can also update the malware at any time, paying an average blockchain fee of about $1.37. Robert Wallace, a consulting leader at Mandiant, Google Cloud, said in a statement, “This development signals an escalation in the threat landscape, as nation-state threat actors are now utilizing new techniques to distribute malware that is resistant to law enforcement take-downs and can be easily modified for new campaigns.”

Following social engineering steps, the infection targets Windows, macOS, and Linux using several malware types: an initial downloader disguised as npm packages, BeaverTail (a JavaScript stealer that collects cryptocurrency wallets and credentials), JADESNOW (a downloader using EtherHiding), and InvisibleFerret (a Python backdoor enabling remote access and persistent data theft). The backdoor specifically targets wallets like MetaMask and Phantom and password managers such as 1Password.

Google described EtherHiding as a move toward advanced bulletproof Hosting, where blockchain features are exploited for malicious purposes. This underscores ongoing cyber threat evolution as attackers adopt new technologies for their activities.

- Advertisement -

For more details, see the public report from the Google Threat Intelligence Group here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ripple Fixes XRP Ledger Node Crash Bug

Ripple released a crucial bug fix in version 3.1.2 of its "rippled" server software...

Bitcoin Tax Exemption Window Targets 2026, Report Says

The Bitcoin Policy Institute (BPI) is targeting a March-August 2026 window to pass a...

Meta to End Instagram Encrypted Chat in May

Meta will end encrypted Instagram chats after May 8, 2026.The move follows internal warnings...

Judge Blocks Trump Subpoenas for Fed’s Powell

A federal judge ruled that subpoenas from the Justice Department targeting Federal Reserve Chair...

Woz’s Crypto Token Plummets 99.9%

Efforce, an energy efficiency token project co-founded by Apple's Steve Wozniak, has lost over...

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...