https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding
https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding
buff.ly/bqpNHo4
buff.ly/bqpNHo4
cybersecuritynews.com/sharkstealer...
cybersecuritynews.com/sharkstealer...
#cyberf="/hashtag/Cyber" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Threats #cyber #security #cyber #security #news
Origin | Interest | Match
#cyberf="/hashtag/Cyber" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Threats #cyber #security #cyber #security #news
Origin | Interest | Match
buff.ly/hJnmqIM
buff.ly/hJnmqIM
“In essence, EtherHiding represents a shift toward next-generation bulletproof hosting, where the inherent features of blockchain technology are repurposed for malicious ends,”
“In essence, EtherHiding represents a shift toward next-generation bulletproof hosting, where the inherent features of blockchain technology are repurposed for malicious ends,”
> JADESNOW uses EtherHiding to fetch, decrypt, and execute malicious payloads
> JADESNOW uses EtherHiding to fetch, decrypt, and execute malicious payloads
1. リクルートを装って声掛け
2. zip をダウンロードさせる
3. zip の中の logo.png に攻撃コード取得が埋め込んである
4. 攻撃コードはブロックチェーン内に置いてサーバーいらず
ブロックチェーン内にあるってことは簡単に消せないしまじ怖いな。
1. リクルートを装って声掛け
2. zip をダウンロードさせる
3. zip の中の logo.png に攻撃コード取得が埋め込んである
4. 攻撃コードはブロックチェーン内に置いてサーバーいらず
ブロックチェーン内にあるってことは簡単に消せないしまじ怖いな。
cloud.google.com/blog/topics/...
cloud.google.com/blog/topics/...
buff.ly/bqpNHo4
buff.ly/bqpNHo4
Google's Threat Intelligence Group has warned that North Korea is using EtherHiding, a blockchain-hiding malware smart contract Cyber hacking operations enable the theft of cryptocurrencies, as 2025 looks…
Google's Threat Intelligence Group has warned that North Korea is using EtherHiding, a blockchain-hiding malware smart contract Cyber hacking operations enable the theft of cryptocurrencies, as 2025 looks…
#仮想通貨
#投資
↓↓続きはこちら↓↓
https://kasotuka.net/crypto/eth/40903/?utm_source=Bluesky
#仮想通貨
#投資
↓↓続きはこちら↓↓
https://kasotuka.net/crypto/eth/40903/?utm_source=Bluesky