Particle.news

Download on the App Store

Google: North Korea-Linked Hackers Are Using 'EtherHiding' to Deliver Malware From Public Blockchains

The tactic turns Ethereum and BNB Smart Chain contracts into a resilient channel for low‑cost, low‑trace payload delivery.

Overview

  • Google Threat Intelligence Group disclosed that the DPRK-linked cluster UNC5342 has employed EtherHiding since February 2025 within its Contagious Interview operation targeting developers.
  • Attackers pose as recruiters on LinkedIn, shift conversations to Telegram or Discord, and induce targets to run code under the guise of a technical assessment.
  • The multi-stage chain uses npm-hosted downloaders, BeaverTail and JADESNOW JavaScript components, and an InvisibleFerret backdoor to steal credentials and cryptocurrency across Windows, macOS, and Linux.
  • JADESNOW retrieves payloads from Ethereum or BNB Smart Chain, with smart contracts updated more than 20 times in four months at roughly $1.37 per change and fetched via read-only calls that leave no visible transaction history.
  • Security researchers describe the adoption as an escalation and advise enterprises to block risky file downloads, enforce strict browser and script policies, and restrict access to known malicious sites and blockchain node endpoints.