#etherhiding
Implementing the Etherhiding technique
Implementing the Etherhiding technique
www.reddit.com
November 9, 2025 at 3:06 PM
Implementing the Etherhiding technique
Implementing the Etherhiding technique
medium.com
November 8, 2025 at 3:24 PM
Implementing the Etherhiding technique
Implementing the Etherhiding technique
Google recently published reports about a new technique called “Etherhiding.” The reports explain how the threat actors UNC5142 and UNC5342…
medium.com
November 8, 2025 at 2:28 PM
Google Threat Intelligence Group (GTIG) has observed the North Korea (DPRK) Threat Actor UNC5342 using "EtherHiding" (embedding malicious Code on a public Blockchain) to deliver Malware and facilitate Cryptocurrency Theft #Infosec #ThreatIntel cloud.google.com/blog/topics/...
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog
North Korea threat actor UNC5342 is leveraging the EtherHiding technique in espionage and financially motivated operations.
cloud.google.com
November 6, 2025 at 8:10 PM
From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
November 3, 2025 at 4:34 PM
From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
November 3, 2025 at 4:31 PM
Get ready for “EtherHiding,” a novel technique that stores malware in blockchain smart contracts to make it nearly impossible to take down through traditional methods. North Korea is apparently all over it. www.riskgaming.com/i/176924823...
October 26, 2025 at 10:59 PM
⚡ 𝑨𝒏𝒂𝒕𝒐𝒎𝒊𝒆 𝒅’𝒖𝒏𝒆 𝒂𝒕𝒕𝒂𝒒𝒖𝒆 𝑬𝒕𝒉𝒆𝒓𝑯𝒊𝒅𝒊𝒏𝒈 : 𝒈𝒓𝒂̂𝒄𝒆 𝒂̀ 𝒍𝒂 𝒃𝒍𝒐𝒄𝒌𝒄𝒉𝒂𝒊𝒏, 𝒍𝒆𝒔 𝑨𝑷𝑻 𝒎𝒆𝒕𝒕𝒆𝒏𝒕 𝒍𝒆 𝑺𝑶𝑪 𝒆𝒏 𝒆́𝒄𝒉𝒆𝒄

buff.ly/bqpNHo4
Anatomie d’une attaque EtherHiding : grâce à la blockchain, les APT mettent le SOC en échec - IT SOCIAL
Deux rapports convergents, publiés par Google Threat Intelligence Group (GTIG) et Unit42 (Palo Alto Networks), lèvent le voile sur une campagne malveillante particulièrement ingénieuse. En…
itsocial.fr
October 25, 2025 at 1:51 PM
SharkStealer malware uses #EtherHiding to exploit #blockchain tech, creating covert C2 channels via #BNB Smart Chain Testnet. A new frontier in #potatosecurity threats. #Malware #PotatoThreats Link: thedailytechfeed.com/sharkstealer...
October 25, 2025 at 8:20 AM
SharkStealer malware uses #EtherHiding to exploit #blockchain tech, creating covert C2 channels via #BNB Smart Chain Testnet. A new frontier in #cybersecurity threats. #Malware #CyberThreats Link: thedailytechfeed.com/sharkstealer...
October 25, 2025 at 7:02 AM
SharkStealer using EtherHiding Pattern to Resolves Communications with C2 Channels:

cybersecuritynews.com/sharkstealer...
October 24, 2025 at 7:09 AM
SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels
SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels
cybersecuritynews.com
October 24, 2025 at 7:02 AM
SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to es...

#cyberf="/hashtag/Cyber" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Threats #cyber #security #cyber #security #news

Origin | Interest | Match
SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels
A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a significant evolution in malware design, utilizing the BNB Smart Chain Testnet as a resilient dead-drop resolver for its C2 infrastructure. This novel approach demonstrates how threat actors exploit Web3 technologies to evade traditional detection mechanisms […]
cybersecuritynews.com
October 24, 2025 at 7:32 AM
⚡ 𝑫𝒆𝒔 𝒉𝒂𝒄𝒌𝒆𝒓𝒔 𝒅'𝒖𝒏 𝑬́𝒕𝒂𝒕-𝒏𝒂𝒕𝒊𝒐𝒏 𝒅𝒊𝒇𝒇𝒖𝒔𝒆𝒏𝒕 𝒅𝒆𝒔 𝒎𝒂𝒍𝒘𝒂𝒓𝒆𝒔 𝒂̀ 𝒑𝒂𝒓𝒕𝒊𝒓 𝒅𝒆 𝒃𝒍𝒐𝒄𝒌𝒄𝒉𝒂𝒊𝒏𝒔 « 𝒊𝒏𝒗𝒊𝒐𝒍𝒂𝒃𝒍𝒆𝒔 », 𝒍'𝒂𝒄𝒕𝒆𝒖𝒓 𝒎𝒂𝒍𝒗𝒆𝒊𝒍𝒍𝒂𝒏𝒕 𝒏𝒐𝒓𝒅-𝒄𝒐𝒓𝒆́𝒆𝒏 𝑼𝑵𝑪5342 𝒖𝒕𝒊𝒍𝒊𝒔𝒆 𝑬𝒕𝒉𝒆𝒓𝑯𝒊𝒅𝒊𝒏𝒈 𝒑𝒐𝒖𝒓 𝒄𝒂𝒄𝒉𝒆𝒓 𝒖𝒏 𝒎𝒂𝒍𝒘𝒂𝒓𝒆 𝒆́𝒕𝒂𝒕𝒊𝒒𝒖𝒆 𝒅𝒂𝒏𝒔 𝒍𝒆𝒔 𝒃𝒍𝒐𝒄𝒌𝒄𝒉𝒂𝒊𝒏𝒔

buff.ly/hJnmqIM
Des hackers d'un État-nation diffusent des malwares à partir de blockchains « inviolables »~? l'acteur malveillant nord-coréen UNC5342 utilise EtherHiding pour cacher un malware étatique dans les blockchains
Le Google Threat Intelligence Group (GTIG) a publié de nouvelles recherches révélant la manière dont le groupe nord-coréen de cybermenace UNC5342 a utilisé une technique appelée « EtherHiding » pour…
securite.developpez.com
October 24, 2025 at 6:19 AM
EtherHidingはクライアント側で防げたりしないんだろうか
October 23, 2025 at 11:31 PM
That sounds like a serious problem.

“In essence, EtherHiding represents a shift toward next-generation bulletproof hosting, where the inherent features of blockchain technology are repurposed for malicious ends,”
Nation-state hackers deliver malware from “bulletproof” blockchains #cybersecurity #infosec
Nation-state hackers deliver malware from “bulletproof” blockchains
Hacking groups—at least one of which works on behalf of the North Korean government—have found a new and inexpensive way to distribute malware from “bulletproof” hosts: stashing them on public cryptocurrency blockchains. In a Thursday post, members of the Google Threat Intelligence Group said the technique provides the hackers with their own “bulletproof” host, a term that describes cloud platforms that are largely immune from takedowns by law enforcement and pressure from security researchers. More traditionally, these hosts are located in countries without treaties agreeing to enforce criminal laws from the US and other nations. These services often charge hefty sums and cater to criminals spreading malware or peddling child sexual abuse material and wares sold in crime-based flea markets. Next-gen, DIY hosting that can’t be tampered with Since February, Google researchers have observed two groups turning to a newer technique to infect targets with credential stealers and other forms of malware. The method, known as EtherHiding, embeds the malware in smart contracts, which are essentially apps that reside on blockchains for Ethereum and other cryptocurrencies. Two or more parties then enter into an agreement spelled out in the contract. When certain conditions are met, the apps enforce the contract terms in a way that, at least theoretically, is immutable and independent of any central authority. “In essence, EtherHiding represents a shift toward next-generation bulletproof hosting, where the inherent features of blockchain technology are repurposed for malicious ends,” Google researchers Blas Kojusner, Robert Wallace, and Joseph Dobson wrote. “This technique underscores the continuous evolution of cyber threats as attackers adapt and leverage new technologies to their advantage.” There’s a wide array of advantages to EtherHiding over more traditional means of delivering malware, which besides bulletproof hosting include leveraging compromised servers. * * The decentralization prevents takedowns of the malicious smart contracts because the mechanisms in the blockchains bar the removal of all such contracts. * Similarly, the immutability of the contracts prevents the removal or tampering with the malware by anyone. * Transactions on Ethereum and several other blockchains are effectively anonymous, protecting the hackers’ identities. * Retrieval of malware from the contracts leaves no trace of the access in event logs, providing stealth * The attackers can update malicious payloads at anytime
arstechnica.com
October 23, 2025 at 5:33 PM
A new “job interview scam”, reverse of the ‘IT worker scam’, here people pose as an exec at a [real] company but the take-home task runs malware (here in a React/Node codebase) www.theregister.com/2025/10/16/n...

> JADESNOW uses EtherHiding to fetch, decrypt, and execute malicious payloads
October 23, 2025 at 12:29 PM
North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts "What is EtherHiding? Google flags malware with crypto-stealing code in smart contracts" https://cointelegraph.com/news/north-korea-hackers-etherhiding-exploit-google
October 23, 2025 at 2:55 AM
🔖 "DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog" https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding?hl=en
October 23, 2025 at 2:55 AM
北朝鮮のブロックチェーンを利用した EtherHiding の手口恐ろしい。サーバーいらない攻撃手段か。

1. リクルートを装って声掛け
2. zip をダウンロードさせる
3. zip の中の logo.png に攻撃コード取得が埋め込んである
4. 攻撃コードはブロックチェーン内に置いてサーバーいらず

ブロックチェーン内にあるってことは簡単に消せないしまじ怖いな。
October 23, 2025 at 2:21 AM
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog
cloud.google.com/blog/topics/...
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog
North Korea threat actor UNC5342 is leveraging the EtherHiding technique in espionage and financially motivated operations.
cloud.google.com
October 23, 2025 at 2:12 AM
⚡ 𝑨𝒏𝒂𝒕𝒐𝒎𝒊𝒆 𝒅’𝒖𝒏𝒆 𝒂𝒕𝒕𝒂𝒒𝒖𝒆 𝑬𝒕𝒉𝒆𝒓𝑯𝒊𝒅𝒊𝒏𝒈 : 𝒈𝒓𝒂̂𝒄𝒆 𝒂̀ 𝒍𝒂 𝒃𝒍𝒐𝒄𝒌𝒄𝒉𝒂𝒊𝒏, 𝒍𝒆𝒔 𝑨𝑷𝑻 𝒎𝒆𝒕𝒕𝒆𝒏𝒕 𝒍𝒆 𝑺𝑶𝑪 𝒆𝒏 𝒆́𝒄𝒉𝒆𝒄

buff.ly/bqpNHo4
Anatomie d’une attaque EtherHiding : grâce à la blockchain, les APT mettent le SOC en échec - IT SOCIAL
Deux rapports convergents, publiés par Google Threat Intelligence Group (GTIG) et Unit42 (Palo Alto Networks), lèvent le voile sur une campagne malveillante particulièrement ingénieuse. En…
itsocial.fr
October 22, 2025 at 3:28 PM
North Korean hackers use “EtherHiding” to host malware on Ethereum, BNB blockchain: Google

Google's Threat Intelligence Group has warned that North Korea is using EtherHiding, a blockchain-hiding malware smart contract Cyber ​​hacking operations enable the theft of cryptocurrencies, as 2025 looks…
North Korean hackers use “EtherHiding” to host malware on Ethereum, BNB blockchain: Google
Google's Threat Intelligence Group has warned that North Korea is using EtherHiding, a blockchain-hiding malware smart contract Cyber ​​hacking operations enable the theft of cryptocurrencies, as 2025 looks set to be a record year for rogue state crypto heists. Google researchers say EtherHiding is being exploited by financially motivated attackers. blockchain It has been distributing information theft tools since at least September 2023, and this is the first time its use by a nation-state has been observed.
earlybirdsinvest.com
October 22, 2025 at 4:58 AM
Google、イーサリアムとBNBブロックチェーン上でEtherHidingマルウェアを使った2億ドル規模の …

#仮想通貨
#投資

↓↓続きはこちら↓↓

https://kasotuka.net/crypto/eth/40903/?utm_source=Bluesky
October 22, 2025 at 2:58 AM