TLDR North Korean hackers are utilizing blockchain technology to develop decentralized command systems. Fake job offers are a common tactic for North Korean cyberattacks. Malware like BeaverTail and OtterCookie is used for credential theft. EtherHiding malware hides payloads on public blockchains for stealth. North Korea-linked hackers are increasing their global cyberattacks using new decentralized and [...] The post North Korean Hackers Expand Global Cyberattacks Using Blockchain Tools appeared first on CoinCentral.TLDR North Korean hackers are utilizing blockchain technology to develop decentralized command systems. Fake job offers are a common tactic for North Korean cyberattacks. Malware like BeaverTail and OtterCookie is used for credential theft. EtherHiding malware hides payloads on public blockchains for stealth. North Korea-linked hackers are increasing their global cyberattacks using new decentralized and [...] The post North Korean Hackers Expand Global Cyberattacks Using Blockchain Tools appeared first on CoinCentral.

North Korean Hackers Expand Global Cyberattacks Using Blockchain Tools

2025/10/17 14:09
4 min read
For feedback or concerns regarding this content, please contact us at [email protected]

TLDR

  • North Korean hackers are utilizing blockchain technology to develop decentralized command systems.
  • Fake job offers are a common tactic for North Korean cyberattacks.
  • Malware like BeaverTail and OtterCookie is used for credential theft.
  • EtherHiding malware hides payloads on public blockchains for stealth.

North Korea-linked hackers are increasing their global cyberattacks using new decentralized and evasive malware tools, according to recent reports from Cisco Talos and Google’s Threat Intelligence Group (GTIG). These campaigns target individuals and companies through fake job recruitment schemes, aiming to steal cryptocurrency, access networks, and evade detection. Researchers warn that the use of blockchain-based command systems is making these operations harder to disrupt.

Expanding Cyber Operations Using Advanced Malware

Cisco Talos has identified a North Korean threat group known as Famous Chollima, which continues to evolve its tactics and tools. The group has been observed using two related malware families named BeaverTail and OtterCookie, both developed to steal credentials and collect sensitive data. These updated variants now share functions that improve communication and efficiency during attacks.

In one case investigated by Cisco Talos, a Sri Lankan organization was indirectly affected when a job seeker was deceived into installing a malicious program as part of a fake technical test. The malware included modules for recording keystrokes and taking screenshots. The collected information was then sent to remote servers controlled by the attackers. Researchers said that this method shows how individuals can be compromised even when organizations are not direct targets.

Blockchain as a Decentralized Command System

Google’s Threat Intelligence Group reported that a North Korean-linked actor, known as UNC5342, has deployed a new malware called EtherHiding. This malware hides malicious JavaScript payloads on public blockchains. By using this approach, attackers build a decentralized command and control (C2) system that is difficult for authorities to remove.

According to GTIG, EtherHiding allows attackers to modify malware behavior remotely without relying on traditional servers. This technique reduces the chances of disruption since blockchain data cannot be easily taken down. Google researchers connected this operation to a broader campaign named Contagious Interview, where fake job offers were used to infect victims. The findings reveal that North Korean groups are integrating decentralized technology to maintain persistence across multiple operations.

Fake Recruitment Campaigns as a Primary Entry Point

Both Cisco and Google observed that these cyber operations often start with fraudulent job postings aimed at professionals in the cryptocurrency and cybersecurity industries. Victims are contacted with supposed interview offers and asked to complete fake assessments that include files embedded with malware.

The infections involve a mix of malware families such as JadeSnow, BeaverTail, and InvisibleFerret, which together enable attackers to steal credentials, deploy ransomware, and gain deeper access into systems. Researchers believe the campaigns seek both financial gain and long-term access to corporate environments for espionage and future exploitation.

Defensive Measures and Ongoing Threats

Cisco Talos and Google have released indicators of compromise (IOCs) to help organizations detect related malicious activity. These indicators include technical markers that security teams can use to monitor and block suspicious behavior linked to these campaigns.

Analysts say that the combination of social engineering and blockchain-based tools is creating new challenges for cybersecurity defense. Since public blockchains cannot be easily controlled or shut down, they are becoming a preferred infrastructure for threat actors seeking to maintain access and conceal their operations.

Researchers from both companies continue to track these campaigns and share findings with the global cybersecurity community. They recommend that organizations verify job offers carefully, restrict file downloads during hiring processes, and update monitoring systems to detect evolving malware families like BeaverTail, OtterCookie, and EtherHiding.

The post North Korean Hackers Expand Global Cyberattacks Using Blockchain Tools appeared first on CoinCentral.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

The post CEO Sandeep Nailwal Shared Highlights About RWA on Polygon appeared on BitcoinEthereumNews.com. Polygon CEO Sandeep Nailwal highlighted Polygon’s lead in global bonds, Spiko US T-Bill, and Spiko Euro T-Bill. Polygon published an X post to share that its roadmap to GigaGas was still scaling. Sentiments around POL price were last seen to be bearish. Polygon CEO Sandeep Nailwal shared key pointers from the Dune and RWA.xyz report. These pertain to highlights about RWA on Polygon. Simultaneously, Polygon underlined its roadmap towards GigaGas. Sentiments around POL price were last seen fumbling under bearish emotions. Polygon CEO Sandeep Nailwal on Polygon RWA CEO Sandeep Nailwal highlighted three key points from the Dune and RWA.xyz report. The Chief Executive of Polygon maintained that Polygon PoS was hosting RWA TVL worth $1.13 billion across 269 assets plus 2,900 holders. Nailwal confirmed from the report that RWA was happening on Polygon. The Dune and https://t.co/W6WSFlHoQF report on RWA is out and it shows that RWA is happening on Polygon. Here are a few highlights: – Leading in Global Bonds: Polygon holds 62% share of tokenized global bonds (driven by Spiko’s euro MMF and Cashlink euro issues) – Spiko U.S.… — Sandeep | CEO, Polygon Foundation (※,※) (@sandeepnailwal) September 17, 2025 The X post published by Polygon CEO Sandeep Nailwal underlined that the ecosystem was leading in global bonds by holding a 62% share of tokenized global bonds. He further highlighted that Polygon was leading with Spiko US T-Bill at approximately 29% share of TVL along with Ethereum, adding that the ecosystem had more than 50% share in the number of holders. Finally, Sandeep highlighted from the report that there was a strong adoption for Spiko Euro T-Bill with 38% share of TVL. He added that 68% of returns were on Polygon across all the chains. Polygon Roadmap to GigaGas In a different update from Polygon, the community…
Share
BitcoinEthereumNews2025/09/18 01:10
USD/CAD Consolidation Holds with Firm Support – Scotiabank’s Crucial Analysis

USD/CAD Consolidation Holds with Firm Support – Scotiabank’s Crucial Analysis

BitcoinWorld USD/CAD Consolidation Holds with Firm Support – Scotiabank’s Crucial Analysis The USD/CAD currency pair continues to exhibit a phase of consolidation
Share
bitcoinworld2026/03/11 01:55
US Dollar Index Plummets from Iran War Highs as Safe-Haven Frenzy Cools

US Dollar Index Plummets from Iran War Highs as Safe-Haven Frenzy Cools

BitcoinWorld US Dollar Index Plummets from Iran War Highs as Safe-Haven Frenzy Cools NEW YORK, March 2025 – The US Dollar Index (DXY) has retreated sharply from
Share
bitcoinworld2026/03/11 02:25