🔥 BitDegree partnered with Ogvio - a free international money transfer service! Join the waitlist & grab Rewards! 🎁

Hackers Use "EtherHiding" to Target Crypto Devs via Smart Contracts

Key Takeaways

  • ​North Korean-linked hackers are hiding malware in blockchain smart contracts, a method called "EtherHiding" that surfaced in 2023;
  • The attacks often begin with fake job offers targeting developers, followed by chats on Discord or Telegram to gain trust;
  • Victims are tricked into downloading malicious files or fake patches, which lead to data theft through multi-stage malware.

Stop overpaying - start transferring money with Ogvio. Join the waitlist & grab early Rewards NOW! 🎁

Hackers Use "EtherHiding" to Target Crypto Devs via Smart Contracts

Google’s Threat Intelligence Group has identified a new tactic used by hackers linked to North Korea.

The method involves hiding harmful software within smart contracts on public blockchain networks. This approach, known as "EtherHiding", began surfacing in 2023.

It often starts with fake job offers or interview invitations sent to software and cryptocurrency developers. Once a target responds, the hackers steer the conversation toward platforms like Discord or Telegram to build trust and continue the scheme.

Crypto Day Trading VS Swapping: What’s More Rewarding? (Animated)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

The attackers also take control of trusted websites by injecting a small script. This script connects to a blockchain smart contract, which holds an additional layer of malware.

By using a "read-only" function to pull the code from the blockchain, the hackers avoid creating any traceable transaction.

During the next phase, the victim is asked to complete a technical task, often involving downloading files from public code-sharing sites like GitHub. These files contain the malware needed to begin the attack.

In some cases, victims are tricked during video calls where a fake system error appears. They are then told to install a "patch" to fix it, which carries the harmful code.

Once the first malware is installed, it launches a second tool, called JADESNOW, which collects sensitive data, including digital wallet information.

Recently, Misleading ads appeared inside Monad’s official Telegram announcement channel before its upcoming token distribution. What did co-founder Keone Hon said? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

GET EARLY REWARDS

Join Ogvio Waitlist
Rating
5.0