Skip to main content
See every side of every news story
Published loading...Updated

Nation-State Hackers Deliver Malware From “Bulletproof” Blockchains

North Korean hackers use EtherHiding to distribute malware via blockchain smart contracts, enabling stealthy updates with low costs and resistance to takedown, Google researchers found.

  • On Thursday, Google Threat Intelligence Group said UNC5342 has used EtherHiding since February to embed malware in smart contracts on public blockchains, marking the first state-backed use of this technique.
  • Because smart contracts are immutable and decentralized, decentralization and immutability prevent takedowns, while EtherHiding offers anonymity and low-cost updates, creating a `bulletproof` host, GTIG says.
  • Victims are targeted via fake job interviews and fabricated companies to download malicious files from GitHub or NPM, where Jadesnow loads InvisibleFerret and a credential stealer updating contracts over 20 times.
  • Security teams are advised to block risky file types, control browser updates, and enforce strict web access and script policies as GTIG says EtherHiding complicates campaign disruption.
  • Guardio Labs first documented EtherHiding in 2023, noting it repurposes smart-contract enforcement to create persistent hosting while traditional bulletproof hosts operate in countries without law-enforcement treaties and cater to crime-oriented hosting services.
Insights by Ground AI

15 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news in on Thursday, October 16, 2025.
Sources are mostly out of (0)
News
For You
Search
BlindspotLocal