Topic: etherhiding technique

  • North Korean Hackers' New EtherHiding Crypto Heist

    North Korean Hackers' New EtherHiding Crypto Heist

    A North Korean hacking group is using EtherHiding, a blockchain-based method that embeds malware in smart contracts, making the blockchain a resilient command-and-control server for malicious activities. EtherHiding resists traditional cybersecurity measures because it operates on a decentralized...

    Read More »
  • North Korean Hackers Hide Malware on Blockchain

    North Korean Hackers Hide Malware on Blockchain

    EtherHiding is a technique used by North Korean hackers to hide malware on public blockchains, making it hard for authorities to disrupt their activities. The UNC5342 group targets software developers through fake recruitment offers, infecting Windows, macOS, and Linux systems with a multi-stage ...

    Read More »
  • Nation-State Hackers Use "Bulletproof" Blockchains to Spread Malware

    Nation-State Hackers Use "Bulletproof" Blockchains to Spread Malware

    State-sponsored hackers, including a North Korean group, are now hiding malware within public cryptocurrency blockchains, creating a resilient and nearly untouchable hosting platform. This technique, called "EtherHiding," embeds malicious code in smart contracts on blockchains like Ethereum, leve...

    Read More »
  • North Korean Hackers Target React2Shell Flaw in EtherRAT Malware

    North Korean Hackers Target React2Shell Flaw in EtherRAT Malware

    A sophisticated malware implant called EtherRAT exploits the critical React2Shell vulnerability, using Ethereum smart contracts for command-and-control and establishing five persistence mechanisms on Linux systems, with links to North Korean threat actors. The React2Shell vulnerability is a sever...

    Read More »