By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: Nation-State Hackers Exploit “Bulletproof” Blockchains to Distribute Malware
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > Nation-State Hackers Exploit “Bulletproof” Blockchains to Distribute Malware
Technology

Nation-State Hackers Exploit “Bulletproof” Blockchains to Distribute Malware

Admin
Last updated: October 17, 2025 8:41 am
Admin
Share
Nation-State Hackers Exploit “Bulletproof” Blockchains to Distribute Malware
SHARE

The Rise of EtherHiding: A New Frontier for Malware Delivery

In recent developments concerning cybersecurity, the cost-efficiency of creating or modifying smart contracts has come under scrutiny. Typically, these processes often cost less than $2 per transaction. This is significant when compared to traditional methods for distributing malware, which are typically more resource-intensive, both in terms of funds and labor.

Contents
The Rise of EtherHiding: A New Frontier for Malware DeliverySocial Engineering Tactics Behind EtherHidingThe Stages of Infection Through Smart ContractsBroader Implications of EtherHiding and Cybercrime

Social Engineering Tactics Behind EtherHiding

Google’s recent observations revealed a layered approach to a malware campaign known as EtherHiding. This campaign utilizes social engineering tactics, notably through fake job recruitment to deceive targets. Many of these targets are developers of cryptocurrency applications or other online services. Once candidates enter the screening process, they are required to complete a test that showcases their coding or code-review skills.

-12% Transform Your Workspace: HUANUO Adjustable Monitor Stand – 2 Pack!
Computer & Accessories

Transform Your Workspace: HUANUO Adjustable Monitor Stand – 2 Pack!

$24.99 Original price was: $24.99.$21.99Current price is: $21.99.
Buy Now
Ultimate USB C Docking Station: Triple Display Hub for Laptops
Computer & Accessories

Ultimate USB C Docking Station: Triple Display Hub for Laptops

$49.99
Buy Now
-20% Raycon Bone Conduction Headphones: 13HR Playtime & IP68 Fit!
Headphones

Raycon Bone Conduction Headphones: 13HR Playtime & IP68 Fit!

$99.99 Original price was: $99.99.$79.99Current price is: $79.99.
Buy Now
Grab the Audio Technica ATH-EQ300M BK: Premium Ear-Fit Headphones!
Headphones

Grab the Audio Technica ATH-EQ300M BK: Premium Ear-Fit Headphones!

$14.40
Buy Now

However, hidden within the required files for these tests is malicious code designed to compromise the candidates’ systems. Such tactics highlight the intersection of skill and deceit in modern cyber-attacks.

Illustration of UNC5342 EtherHiding flow.

The Stages of Infection Through Smart Contracts

The infection process described in the EtherHiding campaign unfolds in stages. Initial malware is installed first, followed by later stages that execute final payloads, often utilizing smart contracts stored on the Ethereum and Binance Smart Chain blockchains—both of which allow open uploads from anyone.

A noteworthy group, tracked as UNC5342 and believed to be backed by North Korea, employs early-stage malware known as JadeSnow. This malware is pivotal in retrieving more advanced malware stored on both the Binance Smart Chain and Ethereum. The researchers noted that using multiple blockchains for EtherHiding is uncommon, potentially indicating a strategy of operational compartmentalization among various teams of North Korean cyber operators. Furthermore, the flexible nature of EtherHiding enables updates to the infection chain and alterations to payload delivery methods.

For instance, there may be instances where a JadeSnow downloader switches from fetching a payload on Ethereum to obtaining it from the Binance Smart Chain. This not only complicates analytical efforts but also takes advantage of the lower transaction fees provided by alternative networks.

Broader Implications of EtherHiding and Cybercrime

Other groups, notably the financially motivated UNC5142, have also been observed employing the EtherHiding method. North Korea’s hacking capabilities, once viewed as rudimentary, have evolved significantly over the past decade. Recent reports indicate that the nation has orchestrated high-profile attack campaigns demonstrating increasing skill, determination, and resources.

In fact, blockchain analysis firm Elliptic recently reported that North Korean hackers have stolen cryptocurrency valued at over $2 billion in 2025 alone. This alarming statistic underscores the rising stakes in cybersecurity and the innovative strategies adopted by cybercriminals.

For those seeking to further explore these developments in cybersecurity and blockchain technology, check out the full article Here.

Image Credit: arstechnica.com

You Might Also Like

Vox Future Perfect 2025 Predictions: Assessing Our Accuracy

“The Phone is Dead: What’s Next for Communication Technology?”

OneXSugar Wallet: First Folding Screen Gaming Handheld Debuts

“Meta Acquires Manus: The AI Startup Everyone’s Buzzing About”

“Gallery TV: LG Unveils Art-Display Innovation at CES 2026”

Share This Article
Facebook Twitter Copy Link Print
Previous Article OnePlus 15 Launch Date Revealed; Ace 6 Set to Join OnePlus 15 Launch Date Revealed; Ace 6 Set to Join
Next Article Coros Apex 4 Launch: The Ultimate Smartwatch for Mountain Adventures Coros Apex 4 Launch: The Ultimate Smartwatch for Mountain Adventures
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • Power Up: Dell 65W USB-C Charger for XPS & Latitude 5000! Power Up: Dell 65W USB-C Charger for XPS & Latitude 5000! $23.29
  • Experience Sony ULT WEAR: Epic Sound & 30hr Battery Life! Experience Sony ULT WEAR: Epic Sound & 30hr Battery Life! $149.99
  • Unlock Your World: Motorola Moto G Power 5G (2023) – 50 MP! Unlock Your World: Motorola Moto G Power 5G (2023) - 50 MP! $144.89
  • Experience Sennheiser RS 120-W: Crystal-Clear Wireless Listening! Experience Sennheiser RS 120-W: Crystal-Clear Wireless Listening! $159.95 Original price was: $159.95.$119.95Current price is: $119.95.
  • Revive Your Tech: Powerful Cordless Air Duster for Keyboards! Revive Your Tech: Powerful Cordless Air Duster for Keyboards! $28.99 Original price was: $28.99.$22.99Current price is: $22.99.

You Might also Like

“Unlocking ChatGPT App Integrations: DoorDash, Spotify, Uber, and More”
Technology

“Unlocking ChatGPT App Integrations: DoorDash, Spotify, Uber, and More”

Admin Admin 7 Min Read
UltraGear Evo Gaming Monitors Launched with Advanced AI Upscaling
Technology

UltraGear Evo Gaming Monitors Launched with Advanced AI Upscaling

Admin Admin 3 Min Read
“Jobs Hiring: Understanding the US Economy’s Struggles in 2025”
Technology

“Jobs Hiring: Understanding the US Economy’s Struggles in 2025”

Admin Admin 7 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?