"EtherRAT & SYS_INFO Module: C2 on Ethereum (EtherHiding), Target Selection, CDN-Like Beacons" published by eSentire. #ClickFix, #EtherHiding, #EtherRAT, #DPRK, #CTI www.esentire.com/blog/etherrat-sys-info-m...
Une méthode inédite, baptisée « #EtherHiding », transforme la #blockchain de #cryptomonnaies #Ethereum en arsenal offensif. Les #chercheurs en #cybersécurité de #Google tirent la sonnette d' #alarme face à cette escalade #technologique
www.futura-sciences.com/tech/actuali...
New cyber threat alert: 'EtherHiding' uses blockchain to deliver malware via fake CAPTCHAs. Stay vigilant and educate users on safe practices. #CyberSecurity #EtherHiding #BlockchainThreats Link: thedailytechfeed.com/cybercrimina...
"Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3)" published by RansomISAC. #EtherHiding, #FamousChollima, #DPRK, #CTI ransom-isac.org/blog/cross-chain-txdatah...
SharkStealer malware uses #EtherHiding to exploit #blockchain tech, creating covert C2 channels via #BNB Smart Chain Testnet. A new frontier in #potatosecurity threats. #Malware #PotatoThreats Link: thedailytechfeed.com/sharkstealer...
SharkStealer malware uses #EtherHiding to exploit #blockchain tech, creating covert C2 channels via #BNB Smart Chain Testnet. A new frontier in #cybersecurity threats. #Malware #CyberThreats Link: thedailytechfeed.com/sharkstealer...
North Korean hackers use #EtherHiding — hiding malware in #Ethereum smart contracts.
You can’t shut down the blockchain — attacks go invisible. ⚠️
odanoder.notion.site/EtherHiding-...
#CyberSecurity #DPRK #Blockchain #Malware
Северокорейские хакеры применяют #EtherHiding — прячут вирусы в смарт-контрактах #Ethereum.
Блокчейн не выключишь — атаки становятся невидимыми. ⚠️
odanoder.notion.site/EtherHiding-...
#CyberSecurity #DPRK #Blockchain #Malware
Google 揭露北韓駭客利用區塊鏈作為無法阻擋的惡意軟體宿主
一個引人入勝的區塊鏈技術呈現,展示其複雜性與創新性,與國家資助網路威脅的分析相關
一個詳細的流程圖,展示在智能合約中嵌入惡意軟體的方法,說明駭客使用的 EtherHiding 技術
北韓駭客利用區塊鏈智能合約散布惡意軟體,每筆交易成本不到2美元卻幾乎無法移除!Google揭露EtherHiding攻擊手法完整分析 🚨
biggo.com.tw/news/202510181552_North-...
#EtherHiding #區塊鏈安全
Google、北朝鮮系ハッカーがブロックチェーンを不死身のマルウェア配信基盤として悪用していることを発見
ブロックチェーン技術の複雑性と革新性を示す魅力的な表現で、国家支援型サイバー脅威の分析に関連しています
スマートコントラクトにマルウェアを埋め込む手法を示す詳細なフローチャート。ハッカーが使用する EtherHiding 技術を図解したもの
北朝鮮ハッカーがブロックチェーンを悪用し、削除不可能なマルウェア配信システムを構築🚨 コストはわずか2ドル未満で、20億ドル以上を窃取した手口とは?
biggo.jp/news/202510181552_North-...
#EtherHiding #ブロックチェーンセキュリティ
#NorthKorea|n #hackers, tracked as #UNC5342, are using the #EtherHiding technique to hide #malware on the #blockchain. This technique, first described by Guardio Labs, allows the threat actor to host #maliciousscripts within #smartcontracts on the Binance Smart Chain or Ethereum, making it…
Some excerpts:
> Since February, Google researchers have observed two groups turning to a newer technique to infect targets with credential stealers and other forms of malware. The method, known as #EtherHiding , embeds the malware in smart contracts, which are essentially apps that reside on [1/8]
DPRK actor UNC5342 stores JavaScript payloads in smart contracts (Ethereum, BNB Smart Chain); loader retrieves via eth_call and delivers JADESNOW / INVISIBLEFERRET, enabling crypto theft and resilient C2. #EtherHiding #UNC5342 #JADESNOW https://bit.ly/4qlCSfY
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts reconbee.com/north-korean...
#northkoreanhackers #northkorean #malware #malwarecampaign #EtherHiding #malwareattack
EtherHiding: la conferma di Google sull’evoluzione DPRK nel nascondere malware su blockchain
il blog: insicurezzadigitale.com/etherhiding-...
#cybersecurity #base64 #blockchain #clickfix #etherhiding #javascript #smartcontract
"DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains" published by Google. #EtherHiding, #JADESNOW, #UNC5342, #DPRK, #CTI cloud.google.com/blog/topics/threat-intel...
📰 Peretas Korea Utara Gunakan “EtherHiding” untuk Sembunyikan Malware di Blockchain
👉 Baca artikel lengkap di sini: ahmandonk.com/2025/10/16/etherhiding-k...
#blockchain #cryptocurrency #dprk #hackers #ethereum #etherhiding #google #threat #intelligence
TDR analysts published an analysis of the new #ClearFake variant that relies on compromised websites injected with the malicious JavaScript framework, the #EtherHiding technique, and the #ClickFix social engineering tactic.
buff.ly/vbiVbsN
#etherhiding (hiding malicious code in blockchain based smart contracts) is not only by #ClearFake related actors – but now also for #Magecart 👇