MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: Hackers’ “bullet-proof” hosts deliver malware from blockchains
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$75,418.00-0.84%
  • ethereumEthereum(ETH)$2,326.21-1.26%
  • tetherTether(USDT)$1.000.02%
  • rippleXRP(XRP)$1.43-0.30%
  • binancecoinBNB(BNB)$622.21-1.86%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$85.33-1.71%
  • tronTRON(TRX)$0.3298250.52%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.041.31%
  • dogecoinDogecoin(DOGE)$0.094686-1.52%
Blockchain Technology

Hackers’ “bullet-proof” hosts deliver malware from blockchains

Last updated: October 17, 2025 2:55 am
Published: 6 months ago
Share

Hacking groups — at least one of which works on behalf of the North Korean government — have found a new and inexpensive way to distribute malware from “bullet-proof” hosts: stashing them on public cryptocurrency blockchains.

In a Thursday post, members of the Google Threat Intelligence Group said the technique provides the hackers with their own “bullet-proof” host, a term that describes cloud platforms that are largely immune from takedowns by law enforcement and pressure from security researchers. More traditionally, these hosts are located in countries without treaties agreeing to enforce criminal laws from the US and other nations. These services often charge hefty sums and cater to criminals spreading malware or peddling child sexual abuse material and wares sold in crime-based flea markets.

Next-gen, DIY hosting that can’t be tampered with

Since February, Google researchers have observed two groups turning to a newer technique to infect targets with credential stealers and other forms of malware. The method, known as EtherHiding, embeds the malware in smart contracts, which are essentially apps that reside on blockchains for Ethereum and other cryptocurrencies. Two or more parties then enter into an agreement spelled out in the contract. When certain conditions are met, the apps enforce the contract terms in a way that, at least theoretically, is immutable and independent of any central authority.

“In essence, EtherHiding represents a shift toward next-generation bulletproof hosting, where the inherent features of blockchain technology are repurposed for malicious ends,” Google researchers Blas Kojusner, Robert Wallace, and Joseph Dobson wrote. “This technique underscores the continuous evolution of cyber threats as attackers adapt and leverage new technologies to their advantage.”

There’s a wide array of advantages to EtherHiding over more traditional means of delivering malware, which besides bullet-proof hosting include leveraging compromised servers.

Creating or modifying smart contracts typically cost less than $2 per transaction, a huge savings in terms of funds and labor over more traditional methods for delivering malware.

Layered on top of the EtherHiding Google observed was a social-engineering campaign that used recruiting for fake jobs to lure targets, many of whom were developers of cryptocurrency apps or other online services. During the screening process, candidates must perform a test demonstrating their coding or code-review skills. The files required to complete the tests are embedded with malicious code.

The infection process relies on a chain of malware that gets installed in stages. Later stages that are responsible for executing the final payloads are then installed through smart contracts the hackers store on the Ethereum and the BNB Smart Chain blockchains, which accept uploads from anyone.

One of the groups Google observed, a North Korean-backed team tracked as UNC5342, uses earlier-stage malware tracked as JadeSnow to retrieve later-stage malware from both the BNB and Ethereum blockchains. The Google researchers observed:

It is unusual to see a threat actor make use of multiple blockchains for EtherHiding activity; this may indicate operational compartmentalization between teams of North Korean cyber operators. Lastly, campaigns frequently leverage EtherHiding’s flexible nature to update the infection chain and shift payload delivery locations. In one transaction, the JADESNOW downloader can switch from fetching a payload on Ethereum to fetching it on the BNB Smart Chain. This switch not only complicates analysis but also leverages lower transaction fees offered by alternate networks.

The researchers said they also observed another group, the financially motivated UNC5142, also employing EtherHiding.

North Korea’s hacking prowess was once considered low caliber. Over the past decade, the country has mounted a series of high-profile attack campaigns that demonstrate growing skill, focus, and resources. Two weeks ago, blockchain analysis firm Elliptic said the nation has stolen cryptocurrency valued at more than $2 billion so far in 2025.

Read more on Ars Technica

This news is powered by Ars Technica Ars Technica

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

$54bn Lost To Trade-Related Illicit Flows
Stablecoins are about reducing volatility – IT News Africa | Business Technology, Telecoms and Startup News
Binance Coin (BNB) Holds, Pi Slips while BlockDAG’s Testnet Becomes the Real Engine of the Next Crypto Boom
Finland’s Credit Rating Cut to AA by Fitch on Fiscal Weakness
Missed PEPE’s 1250% Rally? Analysts Say This Token Could Be the Next Top Crypto

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Ripple Acquires GTreasury for $1B to Boost Corporate Payments Push – Blockonomi
Next Article XMR Prospects to 2030 : The Future of Privacy, Decentralization, and Financial Sovereignty: By Muhammad Qasim
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d