BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

UNC5142 Abuses Blockchain Smart Contracts to Spread Malware

  • A financially motivated group named UNC5142 is spreading information-stealing Malware via blockchain smart contracts.
  • The threat uses hacked WordPress sites and a method called “EtherHiding” that hides malicious code on public blockchains like the BNB Smart Chain.
  • Google uncovered around 14,000 web pages affected by UNC5142 as of June 2025, but no activity has been seen since late July 2025.
  • The attack uses a multi-stage JavaScript downloader called CLEARSHORT, which fetches malware delivered through blockchain smart contracts and social engineering tactics.
  • UNC5142 evolved its smart contract system in late 2024 to a more complex, flexible design that helps avoid detection and enables quick updates.

A financially motivated threat actor identified as UNC5142 has been using blockchain smart contracts to spread malware that steals information from Windows and macOS computers. The group targets compromised WordPress websites and uses a technique called “EtherHiding,” which hides malicious data on public blockchains such as the BNB Smart Chain.

- Advertisement -

Google Threat Intelligence Group (GTIG) reported that as of June 2025, about 14,000 web pages with injected malicious JavaScript related to UNC5142 were detected, showing widespread targeting of vulnerable WordPress sites. However, no related activity has been observed since July 23, 2025, which may indicate a pause or a change in tactics.

The attack chain relies on a JavaScript downloader named CLEARSHORT, which loads malware in several stages. The first stage injects JavaScript code into website files and interacts with a smart contract on the BNB Smart Chain to retrieve further malicious content. The smart contract then fetches an encrypted landing page used to trick victims into running harmful commands on their systems, leading to malware infections.

On Windows, the attack executes a downloaded HTML Application (HTA) file that runs PowerShell scripts to avoid detection and load the final payload directly into memory. On macOS, attackers use deceptive prompts to get users to run terminal commands that download the Atomic Stealer malware.

CLEARSHORT is linked to ClearFake, a known malicious JavaScript framework. French Cybersecurity firm Sekoia previously analyzed ClearFake, which has operated since mid-2023 and began using the social engineering method ClickFix in May 2024.

- Advertisement -

The use of blockchain smart contracts helps UNC5142 blend in with normal Web3 activities and makes their operations more resistant to takedown efforts. Since November 2024, the group has moved from a simple contract system to a sophisticated three-contract design based on the proxy pattern, a common software method for upgradable code. This change allows quick updates to key parts like URLs and decryption keys without modifying the malicious JavaScript.

The mutable data stored by smart contracts lets UNC5142 change the malware delivery details by paying small blockchain fees under $2. Google identified two main smart contract infrastructures: the primary system created in November 2024 and a secondary one started in February 2025, used to support increased activity or testing.

GTIG noted, “Given the frequent updates to the infection chain coupled with the consistent operational tempo, high volume of compromised websites, and diversity of distributed malware payloads over the past year and a half, it is likely that UNC5142 has experienced some level of success with their operations.”

For more details, the full report is available at Google Threat Intelligence Group.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Instructure Pays Extortionists After Canvas Data Breach

Instructure, the parent company of Canvas, reached a ransom agreement with the ShinyHunters cybercrime...

Nvidia Hits $5.4 Trillion Market Cap Milestone

NVIDIA stock (NASDAQ: NVDA) hit a $5.4 trillion market cap and a yearly high...

Triple Indictment in $13M Crypto Heist at Gunpoint

Three men from Tennessee were federally indicted for conspiracy, robbery, and kidnapping charges related...

Tesla’s China FSD Approval Delayed to Q3

Tesla's Full Self-Driving (FSD) software approval in China is delayed, with expectations shifting to...

Binance AI Security Saved Users $10bn in 15 Months

Binance reports its AI security tools prevented over $10.5 billion in user losses from...

Must Read

How to Buy VPN With Bitcoin Using CyberGhost VPN

In this step-by-step guide, you will learn how to purchase a VPN (Virtual Private Network) subscription using Bitcoin, a popular cryptocurrency, and CyberGhost VPN,...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading