Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Gundam Breaker 4 Review – Steam Deck, Switch, and PS5 Tested – TouchArcade

    May 8, 2026

    10 Near-Perfect Sci-Fi Movies of the Last 6 Years, Ranked

    May 8, 2026

    Dinan-Tuned BMW Z8 With ALPINA Wheels Hits Auction

    May 8, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Nation-state hackers deliver malware from “bulletproof” blockchains
    Nation-state hackers deliver malware from “bulletproof” blockchains
    Tech Reviews

    Nation-state hackers deliver malware from “bulletproof” blockchains

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 16, 2025No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Creating or modifying smart contracts typically cost less than $2 per transaction, a huge savings in terms of funds and labor over more traditional methods for delivering malware.

    Layered on top of the EtherHiding Google observed was a social-engineering campaign that used recruiting for fake jobs to lure targets, many of whom were developers of cryptocurrency apps or other online services. During the screening process, candidates must perform a test demonstrating their coding or code-review skills. The files required to complete the tests are embedded with malicious code.



    Illustration of UNC5342 EtherHiding flow.

    Illustration of UNC5342 EtherHiding flow.

    The infection process relies on a chain of malware that gets installed in stages. Later stages responsible for executing the final payloads are then installed through smart contracts that the hackers store on the Ethereum and the BNB Smart Chain blockchains, which accept uploads from anyone.

    One of the groups Google observed, a North Korean-backed team tracked as UNC5342, uses earlier-stage malware tracked as JadeSnow to retrieve later-stage malware from both the BNB and Ethereum blockchains. The Google researchers observed:

    It is unusual to see a threat actor make use of multiple blockchains for EtherHiding activity; this may indicate operational compartmentalization between teams of North Korean cyber operators. Lastly, campaigns frequently leverage EtherHiding’s flexible nature to update the infection chain and shift payload delivery locations. In one transaction, the JADESNOW downloader can switch from fetching a payload on Ethereum to fetching it on the BNB Smart Chain. This switch not only complicates analysis but also leverages lower transaction fees offered by alternate networks.

    The researchers said they also observed another group, the financially motivated UNC5142, also employing EtherHiding.

    North Korea’s hacking prowess was once considered low caliber. Over the past decade, the country has mounted a series of high-profile attack campaigns that demonstrate growing skill, focus, and resources. Two weeks ago, blockchain analysis firm Elliptic said the nation has stolen cryptocurrency valued at more than $2 billion so far in 2025.

    Table of Contents

    Toggle
      • Related posts:
    • US-sanctioned currency exchange says $15 million heist done by "unfriendly states"
    • World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage
    • Google is also removing apps used to report sightings of ICE agents

    Related posts:

    Malicious Microsoft VSCode AI extensions might have hit over 1.5 million users

    I tested Dyson's impossibly compact new vacuum, and it was a revelation – here's why

    Eyeing up an NBN 750 plan? I’d save your money and make this financially savvy decision instead

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNvidia börjar sälja DGX Spark en AI-dator för $3999 denna vecka
    Next Article 7 Best GitHub Repositories For Mastering RAG Systems
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    One of my top gaming headset picks just got a new level of personalization — Audeze’s ReSkin earcup covers let you ‘bring flair and personality’ to your headset

    May 8, 2026
    Tech Reviews

    Mozilla says 271 vulnerabilities found by Mythos have “almost no false positives”

    May 8, 2026
    Tech Reviews

    Twitch Has New Penalties For Streamers Caught Viewbotting, CEO Says

    May 8, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025143 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202575 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202574 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025143 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202575 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202574 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.