The post North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts appeared on BitcoinEthereumNews.com. North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group. The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google. Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site. Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said. The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike. Related: CZ’s Google account targeted by ‘government-backed’ hackers Know the signs: North Korea social engineering campaign decoded The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google. After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task. “The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious… The post North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts appeared on BitcoinEthereumNews.com. North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group. The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google. Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site. Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said. The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike. Related: CZ’s Google account targeted by ‘government-backed’ hackers Know the signs: North Korea social engineering campaign decoded The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google. After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task. “The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious…

North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts

North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group.

The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google.

Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site.

Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud

The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said.

The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike.

Related: CZ’s Google account targeted by ‘government-backed’ hackers

Know the signs: North Korea social engineering campaign decoded

The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google.

After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task.

“The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious files from online code repositories like GitHub, where the malicious payload is stored. 

In other instances, the attackers lure the victim into a video call, where a fake error message is displayed to the user, prompting them to download a patch to fix the error. This software patch also contains malicious code.

Once the malicious software is installed on a machine, second-stage JavaScript-based malware called “JADESNOW” is deployed to steal sensitive data.

A third stage is sometimes deployed for high-value targets, allowing the attackers long-term access to a compromised machine and other systems connected to its network, Google warned.

Magazine: Inside a 30,000 phone bot farm stealing crypto airdrops from real users

Source: https://cointelegraph.com/news/north-korea-hackers-etherhiding-exploit-google?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Market Opportunity
Smart Blockchain Logo
Smart Blockchain Price(SMART)
$0.003719
$0.003719$0.003719
-0.74%
USD
Smart Blockchain (SMART) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Where is the Bottom for Bitcoin?

Where is the Bottom for Bitcoin?

Bitcoin is poised to mark its third week of consistent decline, slipping to one of its lowest levels in the last two years. It is no longer a question of whether
Share
Coinstats2026/02/09 03:22
Mysterious whales are accumulating these cryptocurrencies after market crash

Mysterious whales are accumulating these cryptocurrencies after market crash

The post Mysterious whales are accumulating these cryptocurrencies after market crash appeared on BitcoinEthereumNews.com. In a week where the cryptocurrency market
Share
BitcoinEthereumNews2026/02/09 02:53
HOT MOMENTS: FOMC Statement Released Following the Fed Interest Rate Decision – Here Are All the Details of the Full Text

HOT MOMENTS: FOMC Statement Released Following the Fed Interest Rate Decision – Here Are All the Details of the Full Text

The post HOT MOMENTS: FOMC Statement Released Following the Fed Interest Rate Decision – Here Are All the Details of the Full Text appeared on BitcoinEthereumNews.com. The Fed has resumed interest rate cuts after a nine-month hiatus, lowering the federal funds rate by 25 basis points to a range of 4% to 4.25%. According to the “dot plot” projection reflected in the decision text, two additional interest rate cuts are envisaged in 2025. While 9 out of 19 officials expected two more interest rate cuts this year, 2 predicted a single cut, and 6 predicted no additional cuts. Newly appointed Fed Board member Stephen I. Miran dissented from the decision, voting for a stronger 50 basis point cut. The decision noted that economic growth slowed in the first half of the year, employment growth slowed, and the unemployment rate rose slightly. It also noted that inflation had begun to rise but remained high. While reiterating that it maintains its long-term targets of maximum employment and 2% inflation, the Fed noted that uncertainties regarding the economic outlook remain high. The statement read, “The Committee assesses that downside risks to employment have increased, in line with the balance of risks.” The statement stated that interest rate policy will be reshaped in the coming period, taking into account future data, the economic outlook, and the balance of risks. It also noted that the reduction in holdings of Treasury bonds, corporate debt instruments, and mortgage-backed securities will continue. The resolution was supported by Fed Chair Jerome Powell, Vice Chair John C. Williams, and board members Michael S. Barr, Michelle W. Bowman, Susan M. Collins, Lisa D. Cook, Austan D. Goolsbee, Philip N. Jefferson, Alberto G. Musalem, Jeffrey R. Schmid, and Christopher J. Waller. *This is not investment advice. Follow our Telegram and Twitter account now for exclusive news, analytics and on-chain data! Source: https://en.bitcoinsistemi.com/hot-moments-fomc-statement-released-following-the-fed-interest-rate-decision-here-are-all-the-details-of-the-full-text/
Share
BitcoinEthereumNews2025/09/18 14:18