North Korean Hackers Use EtherHiding for Malware, Crypto Theft

North Korean-Linked Hackers Use EtherHiding to Spread Malware and Steal Cryptocurrency via Blockchain Smart Contracts Targeting Developers

  • A North Korean-linked Hacking group has used the EtherHiding method to spread Malware and steal cryptocurrency.
  • The campaign targets developers on LinkedIn, then uses Telegram or Discord to deliver malicious code.
  • EtherHiding stores harmful code inside blockchain smart contracts, making it hard to remove or trace.
  • The attack affects Windows, macOS, and Linux with multiple malware families, including backdoors and data stealers.
  • This marks the first time a state-sponsored actor has employed EtherHiding, highlighting a shift in cyberattack techniques.

A threat group connected to North Korea has employed the EtherHiding technique to distribute malware and steal cryptocurrency. This activity, observed by the Google Threat Intelligence Group (GTIG), began in February 2025. The group, known in different security communities by names such as UNC5342 and Famous Chollima, targets developers through LinkedIn before moving conversations to platforms like Telegram or Discord to deploy malicious code.

- Advertisement -

The campaign, called Contagious Interview, aims to gain unauthorized access to developers’ devices, exfiltrate sensitive information, and illegally acquire cryptocurrency assets. EtherHiding works by embedding harmful code in blockchain smart contracts on networks like Ethereum or BNB Smart Chain. This lets the attackers use the blockchain as a decentralized dead drop resolver, a way to exchange data that is resistant to takedown or tracing efforts.

Google noted that EtherHiding makes use of the blockchain’s pseudonymous transactions to hide who deploys the contracts. The attackers can also update the malware at any time, paying an average blockchain fee of about $1.37. Robert Wallace, a consulting leader at Mandiant, Google Cloud, said in a statement, “This development signals an escalation in the threat landscape, as nation-state threat actors are now utilizing new techniques to distribute malware that is resistant to law enforcement take-downs and can be easily modified for new campaigns.”

Following social engineering steps, the infection targets Windows, macOS, and Linux using several malware types: an initial downloader disguised as npm packages, BeaverTail (a JavaScript stealer that collects cryptocurrency wallets and credentials), JADESNOW (a downloader using EtherHiding), and InvisibleFerret (a Python backdoor enabling remote access and persistent data theft). The backdoor specifically targets wallets like MetaMask and Phantom and password managers such as 1Password.

Google described EtherHiding as a move toward advanced bulletproof Hosting, where blockchain features are exploited for malicious purposes. This underscores ongoing cyber threat evolution as attackers adopt new technologies for their activities.

- Advertisement -

For more details, see the public report from the Google Threat Intelligence Group here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Caterpillar, NVIDIA Team Up to Add AI to Machines, Factories

Caterpillar Inc. expanded a partnership with NVIDIA to add AI across its machines, factories,...

Premier League crypto sponsors drop to 13 amid FCA warnings.

Thirteen of 20 Premier League clubs have crypto-related sponsors in the 2025/26 season.Socios is...

JPM Coin Moves to Canton Network for Near-Instant Use Today!

JPMorgan’s Kinexys will bring its JPM Coin to the privacy-enabled Canton Network in a...

Radix Consultation Live: Vote on Season 1 End & Vesting ASAP

Radix has opened a formal consultation to set the Season 1 end date and...

Prosecutors Appeal Judge’s Acquittal of Mango Exploiter Case

Prosecutors have appealed the judge’s decision that overturned the conviction of Avraham Eisenberg for...
- Advertisement -

Must Read

How to Buy VPS with Crypto from Hostinger – Step by Step guide

Did you know that nowadays you can use Bitcoin to purchase a Windows VPS? If you’re here, you’re probably wondering how to do it....
Bitcoin (BTC) $ 90,982.00 1.23%
Ethereum (ETH) $ 3,139.06 2.60%
XRP (XRP) $ 2.19 2.04%
Bittensor (TAO) $ 273.64 3.17%
Polkadot (DOT) $ 2.15 0.23%
Cardano (ADA) $ 0.403208 1.07%
Chainlink (LINK) $ 13.38 2.02%
Hyperliquid (HYPE) $ 26.94 1.34%
Monero (XMR) $ 438.36 1.80%
Hedera (HBAR) $ 0.123162 2.44%
Toncoin (TON) $ 1.86 1.01%