North Korean hackers seen using blockchain to hide crypto-stealing malware

North Korean state-linked hackers have begun using public blockchains to deliver malware and steal cryptocurrency, in what researchers say is the first known case of a nation-state adopting the technique.

Google security researchers said on Thursday that they observed a Pyongyang-backed hacking group, tracked as UNC5342, deploying a method known as EtherHiding — a way of embedding malicious code inside smart contracts on decentralized networks such as Ethereum and BNB Smart Chain.

The technique makes it harder to block or remove malware, since the code is stored on blockchain ledgers that cannot be taken offline or altered. The malicious code remains accessible as long as the blockchain itself is operational, according to researchers.

“This represents a shift toward next-generation bulletproof hosting,” Google said, noting that attackers are increasingly exploiting the same decentralization features that make blockchain resilient.

Since February, UNC5342 has used EtherHiding as part of a social-engineering campaign that lures developers — often those working in the cryptocurrency or tech industries — into downloading malware disguised as job-related files or coding challenges.

Once a target opens the file, a malicious script connects to the blockchain to retrieve encrypted code from a smart contract. That code installs the JadeSnow loader, which in turn delivers a more persistent backdoor known as InvisibleFerret that has been used in multiple cryptocurrency thefts.

Because the malicious payloads are stored on decentralized blockchains, they cannot be removed by traditional takedown efforts. Attackers can also quietly update or replace their malware by modifying the smart contract, Google said.

Blockchain’s pseudonymous nature adds another layer of anonymity, making it difficult to identify those behind the operation.

Google said EtherHiding was first used in 2023 by a financially motivated group known as UNC5142, but this is the first time a state-sponsored actor has adopted it.

The company added that while the hackers rely on decentralized blockchains to store their code, they still interact through centralized web services that defenders can monitor or block to disrupt attacks.

“In other words, UNC5142 and UNC5342 are using permissioned services to interact with permissionless blockchains,” the researchers said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Microsoft warns of a 32% surge in identity hacks, mainly driven by stolen passwords

Next Post

Cambodia to repatriate South Koreans ensnared by scam industry amid diplomatic pressure

Related Posts

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race
Read More

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail email software that could be exploited to achieve remote code execution. The vulnerability, tracked as CVE-2025-52691, carries a CVSS score of 10.0. It relates to a case of arbitrary file upload that could enable code execution without requiring any
Read More

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years after the hacking group was observed targeting victims in Sweden, the Netherlands, and Turkey. "The scale of Prince of Persia's activity is more significant than we originally anticipated," Tomer Bar, vice president of security research at SafeBreach, said
Read More