North Korean hackers found hiding crypto-stealing malware with Blockchain

  • UNC5342 uses blockchain smart contracts to deliver crypto-stealing malware via EtherHiding
  • Fake jobs and coding challenges lure developers into triggering the JadeSnow loader and backdoor
  • Blockchain’s immutability makes malware hosting resilient

North Korean state-sponsored threat actors are now using public blockchains to host malicious code and deploy malware on target endpoints.

This is according to Google’s Threat Intelligence Group (GTIG), who said they observed UNC5342 using Ethereum and BNB to host droppers and ultimately deploy cryptocurrency-stealing malware against software and blockchain developers.

The technique is called EtherHiding. Instead of sending a malicious file directly to the victim (or otherwise tricking them into downloading it), they encode parts of the malware into blockchain transactions and smart contracts.

Evolution of bulletproof hosting

The smart contract itself doesn’t execute malware automatically on someone’s computer, but it can deliver instructions or code when a user interacts with it (when they click a link, run a script, or connect a crypto wallet).

The blockchain is a great place to store and distribute malware since it is public, immutable, and almost impossible to tamper.

“This represents a shift toward next-generation bulletproof hosting,” Google said, stressing that the blockchain’s resilient nature is what makes it so enticing for cybercrooks.

From February, UNC5342 was observed creating fake jobs and coding challenges, tricking developers and others working in the Web3 space to download different files. These files connect to the blockchain and retrieve the code which, in turn, installs the JadeSnow loader. This loader drops the InvisibleFerret backdoor, which was already observed used in cryptocurrency thefts.

This is not the first time we’re seeing blockchain being used to deliver malware. The technique has been in use since 2023, and in the same report, Google also mentioned a financially motivated actor UNC5142 using the same technique.

This group was seen compromising WordPress sites to host malicious JavaScript code that connected to the blockchain. More than 14,000 infected sites were found so far.

North Korea is known for targeting the crypto industry and using the stolen funds to finance its weapons program and state apparatus.

Via The Record

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

You might also like

Read more @ TechRadar

Latest posts

You need to listen to the searing noise pop album Forever in Your Heart

The cover goes as hard as the album does. There's something irresistible about music that sounds as if it's coming apart at the seams. The...

How to watch Grey Cup 2025 on CFL+ — it’s *FREE*

Grey Cup 2025: Roughriders vs AlouettesStart Time: Sun. 16 November — 6pm ET / 11pm GMT / 8am AEST (Mon.)Watch the Grey Cup 2025...

Valve could shake up the console gaming space, but for now, here are 4 things the Steam Machine means for PC gamers

It's no secret by now that Valve's reveal of the Steam Machine was a huge surprise for everyone, considering its silence (albeit warranted) after...

Hackers, your game is over – US government announces ‘strike force’ to stamp out Southeast Asian cyber scams

US Strike Force targets scam centers in Burma, Cambodia, and LaosCrypto Seizure team forfeits over $401 million from fraudulent operationsChinese transnational criminal organizations implicated...

Walmart’s first round of Black Friday deals ends tonight – 50% off AirPods, cheap TVs, air fryers, toys, and more

Walmart's first official Black Friday sale launched this past Friday, and all deals expire tonight at Midnight PST. As TechRadar's deals editor, I've been...

Can top AI tools be bullied into malicious work? ChatGPT, Gemini, and more are put to the test, and the results are actually genuinely...

Gemini Pro 2.5 frequently produced unsafe outputs under simple prompt disguisesChatGPT models often gave partial compliance framed as sociological explanationsClaude Opus and Sonnet refused...

Hackers spin a tedious yarn – fabric supplier behind H&M, Adidas, and more hit by worrying cyber breach

Fulgar confirms ransomware attack linked to notorious RansomHouse groupAttackers published internal documents, including bank balances, invoices, and sensitive communicationsFulgar's clients include the likes of...

Stereogum soldiers on in the era of streaming and AI

If you're an indie rock fan of a certain age, the name Stereogum will probably conjure strong feelings. The site was launched "January 1st,...

The Mac Pro could be the latest addition to Apple’s product purgatory

The wait for a new Mac Pro may take a lot longer, according to the latest Power On newsletter. Bloomberg's Mark Gurman reported that...

The Meta Quest 3S VR headset drops to a record-low price for Black Friday

Meta's entry-level VR headset, the Quest 3S, is down to an even more budget-friendly price than usual in a deal on Amazon right now....