Tools

News

Notícias

Classificados

Cursos

Broker

 
IPv4:
IPv6:
UpOrDown
Ping
MTR
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc & Sum

State-Sponsored Hackers Use Blockchains as Bulletproof Hosts

Image © Arstechnica
Researchers report that North Korea-backed groups are distributing malware by embedding payloads in smart contracts on Ethereum and the BNB Smart Chain, creating a resilient, hard-to-take-down hosting environment known as EtherHiding.

Two hacking groups, including a North Korea–linked unit, have begun using EtherHiding to distribute malware by embedding payloads inside smart contracts on public blockchains such as Ethereum and the BNB Smart Chain. Google Threat Intelligence Group researchers say this technique creates a portable, resilient form of “bulletproof” hosting that is difficult for authorities to remove.

EtherHiding relies on smart contracts that automatically enforce terms when specified conditions are met. Because these contracts live on decentralized networks, there is no central portal to delete the code or takedown the payload, complicating attempts at takedowns by law enforcement and security researchers alike.

The approach offers several advantages over traditional malware delivery methods. It can reduce hosting costs while spreading components across multiple blockchains, enabling operators to update payloads by modifying contract logic and making transaction histories harder to trace back to individuals.

Researchers say UNC5342, a North Korea–backed group, has used JadeSnow to stage infections and retrieve later-stage payloads from both Ethereum and the BNB chain. A second group, UNC5142, has also been observed employing EtherHiding, highlighting how actors are adapting blockchain technology to sustain operations and complicate attribution.

Analysts note this development underscores North Korea’s growing cyber capabilities. Elliptic recently reported that the regime has stolen cryptocurrency valued at more than $2 billion in 2025, illustrating the scale at which adversaries may leverage blockchain ecosystems for illicit gain, including malware distribution and related activities.

 

Arstechnica

Notícias relacionadas

NEO reúne lideranças de telecom em Salvador
NTSEC aponta desafio de unir TI, TO e cibersegurança
Prazo estendido para instalação de parabólicas digitais
Rede ruim atrapalha TIC na educação
Hack4Edu foca IA generativa na educação
Telefônica Cloud fecha acordo de nuvem de R$702,5 milhões

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento de cookies

Usamos cookies para melhorar sua experiência em nosso site.

Ao usar nosso site, você concorda com os cookies. Saiba mais sobre o site