The post North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts appeared on BitcoinEthereumNews.com. North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group. The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google. Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site. Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said. The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike. Related: CZ’s Google account targeted by ‘government-backed’ hackers Know the signs: North Korea social engineering campaign decoded The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google. After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task. “The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious… The post North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts appeared on BitcoinEthereumNews.com. North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group. The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google. Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site. Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said. The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike. Related: CZ’s Google account targeted by ‘government-backed’ hackers Know the signs: North Korea social engineering campaign decoded The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google. After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task. “The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious…

North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts

North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group.

The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google.

Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site.

Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud

The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said.

The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike.

Related: CZ’s Google account targeted by ‘government-backed’ hackers

Know the signs: North Korea social engineering campaign decoded

The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google.

After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task.

“The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious files from online code repositories like GitHub, where the malicious payload is stored. 

In other instances, the attackers lure the victim into a video call, where a fake error message is displayed to the user, prompting them to download a patch to fix the error. This software patch also contains malicious code.

Once the malicious software is installed on a machine, second-stage JavaScript-based malware called “JADESNOW” is deployed to steal sensitive data.

A third stage is sometimes deployed for high-value targets, allowing the attackers long-term access to a compromised machine and other systems connected to its network, Google warned.

Magazine: Inside a 30,000 phone bot farm stealing crypto airdrops from real users

Source: https://cointelegraph.com/news/north-korea-hackers-etherhiding-exploit-google?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Market Opportunity
Smart Blockchain Logo
Smart Blockchain Price(SMART)
$0.004856
$0.004856$0.004856
-6.09%
USD
Smart Blockchain (SMART) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

XRP Hits ‘Extreme Fear’ Levels - Why This Is Secretly Bullish

XRP Hits ‘Extreme Fear’ Levels - Why This Is Secretly Bullish

Ripple’s native token XRP is still battling out with the bears at the $1.90 territory on Friday afternoon. The support-turned-resistance at $1.90 is particularly
Share
Coinstats2026/01/24 03:25
Tokyo’s Metaplanet Launches Miami Subsidiary to Amplify Bitcoin Income

Tokyo’s Metaplanet Launches Miami Subsidiary to Amplify Bitcoin Income

Metaplanet Inc., the Japanese public company known for its bitcoin treasury, is launching a Miami subsidiary to run a dedicated derivatives and income strategy aimed at turning holdings into steady, U.S.-based cash flow. Japanese Bitcoin Treasury Player Metaplanet Opens Miami Outpost The new entity, Metaplanet Income Corp., sits under Metaplanet Holdings, Inc. and is based […]
Share
Coinstats2025/09/18 00:32
The GENIUS Act Is Already Law. Banks Shouldn’t Try to Rewrite It Now

The GENIUS Act Is Already Law. Banks Shouldn’t Try to Rewrite It Now

The post The GENIUS Act Is Already Law. Banks Shouldn’t Try to Rewrite It Now appeared on BitcoinEthereumNews.com. Healthy competition drives innovation and better products for consumers; it is at the center of American economic leadership. Unfortunately, now that the bipartisan GENIUS Act has been signed into law, major legacy financial institutions seem to be having second thoughts about the innovations that stablecoins can bring to financial markets. Bank lobbying groups and public affairs teams have been peppering Congress with complaints about the law, urging members to reopen debate and introduce changes to the legislation that will ensure the stablecoin market doesn’t grow too quickly, protecting banks’ profits and stifling consumer choice. This reactionary response is both overblown and unnecessary. What legacy financial firms should do instead is embrace competition and offer exciting new products and services that consumers want, not try to kneecap emerging players through anti-innovation rules and regulations. The GENIUS Act was carefully designed with a thorough bipartisan process to strengthen consumer safeguards, ensure regulatory oversight, and preserve financial stability. Efforts to roll back its provisions are less about protecting families and more about protecting entrenched banking interests from the competition that helps ensure the U.S. banking system stays the strongest and most innovative in the world. Critics warn that allowing stablecoins to provide rewards could lead to massive deposit outflows from community banks, with figures as high as $6.6 trillion cited. But closer examination shows this fear is unfounded. A July 2025 analysis by consulting firm Charles River Associates found no statistically significant relationship between stablecoin adoption and community bank deposit outflows. In fact, the overwhelming majority of stablecoin reserves remain in the traditional financial system — either in commercial bank accounts or in short-term Treasuries — where they continue to support liquidity and credit in the broader U.S. economy. The dire estimates rely on unrealistic assumptions that every dollar of stablecoin issuance permanently…
Share
BitcoinEthereumNews2025/09/18 09:39