North Korean hackers

North Korean hackers adopt EtherHiding to conceal malware inside blockchain smart contracts

North Korean hackers are using a blockchain technique called EtherHiding to hide and deliver malware through smart contracts. According to Google’s Threat Intelligence Group, this is the first time a state-sponsored group has been observed exploiting the method. The attackers, tracked as UNC5342, are running a campaign that tricks developers into engaging with fake job offers and downloading code disguised as technical assessments. Once executed, the code interacts with blockchain contracts to retrieve additional malware, enabling cross-platform compromise and large-scale theft of cryptocurrency and credentials.

Summary of the activity

UNC5342 has been associated with North Korea’s well-documented focus on cyber espionage and financial theft. The group is known for targeting developers and technology professionals, often pretending to be recruiters on LinkedIn or other professional platforms. In this latest wave, the group adopted EtherHiding, a tactic that allows malware to be stored and distributed through blockchain smart contracts rather than traditional hosting. This makes the infrastructure resilient, updateable, and far more difficult to take down.

The shift to blockchain-based hosting reflects a growing trend where attackers exploit decentralized technologies for persistence. Unlike domains or cloud servers, smart contracts remain public and replicated across nodes globally, making it nearly impossible to erase malicious data once it has been committed to the chain. For North Korean hackers, who rely on consistent access to victim systems to extract funds and intelligence, EtherHiding represents a natural evolution of their operations.

How the campaign starts

The campaign often begins with targeted social engineering on LinkedIn. Hackers pose as recruiters for well-known tech companies, offering lucrative positions to skilled developers. Once contact is established, they encourage the victim to move conversations to Telegram or Discord. This step lowers suspicion and gives the attackers freedom to deliver malicious files away from professional oversight. The files are disguised as job assessment materials or coding assignments.

When executed, the malicious code operates as an initial downloader. Rather than pulling data from a conventional server, it queries a smart contract on BNB Smart Chain or Ethereum. That smart contract contains hidden logic or references to other payloads, which are retrieved in subsequent stages. This interaction transforms the blockchain into a command-and-control system, one that is cheap for attackers to maintain and almost impossible for defenders to dismantle fully.

Why EtherHiding matters

EtherHiding is significant because it turns the blockchain’s strongest features into advantages for attackers. Smart contracts are immutable, decentralized, and transparent, which makes them ideal for persistence. Even if an address is reported or flagged, the malicious data remains replicated across thousands of nodes worldwide. Law enforcement cannot simply seize or suspend it in the way they would with a domain name or hosting service.

Another benefit for attackers is flexibility. By publishing new transactions, they can update or replace payloads embedded in the blockchain. The cost for this activity is minimal, often less than two dollars in gas fees. For a state-backed group with long-term campaigns, this means their infrastructure can shift rapidly without any meaningful expense. Security experts describe this as a new form of bulletproof hosting, one that leverages decentralization to resist disruption and to evolve continuously.

Malware chain and technical details

Researchers describe a multi-layer infection process designed to maximize reach and survivability. The first stage is a downloader, often disguised as an npm package or developer-friendly script. Once run, it connects to a malicious smart contract and retrieves another component. This stage is known to install JADESNOW, a JavaScript downloader that fetches further payloads by querying blockchain transaction history. From there, additional malware is delivered, including BeaverTail, which steals wallet data and browser credentials, and InvisibleFerret, a backdoor capable of long-term surveillance and remote control.

The operation is capable of infecting Windows, macOS, and Linux systems. This broad compatibility makes it more dangerous because it can target almost any developer, regardless of their chosen operating system. In some cases, attackers attempt to install a portable Python interpreter, which allows them to execute even more modules retrieved from other blockchain addresses. This layering of malware, combined with blockchain-based delivery, shows how advanced the campaign has become.

Why this matters

The adoption of EtherHiding by North Korean hackers raises the stakes for cybersecurity defenders worldwide. This is the first documented case of a state actor using the technique, setting a precedent that could inspire others. If widely adopted, it could usher in an era where malicious code is hidden permanently in public blockchain networks, beyond the reach of takedowns or domain seizures.

By targeting developers directly, the campaign also threatens the software supply chain. A single compromised developer account could expose companies to stolen source code, leaked intellectual property, or compromised applications. Combined with theft of cryptocurrency and credentials, this dual-purpose campaign highlights how North Korea continues to blend financial motives with espionage.

How this fits prior UNC5342 activity

UNC5342 and its related clusters have long focused on technology professionals. Previous campaigns lured developers with fake jobs, pushed malicious npm or PyPI packages, and relied on traditional infrastructure to host payloads. The switch to EtherHiding demonstrates a clear evolution. By abandoning vulnerable servers and embracing blockchain, the group is innovating in ways that make detection and remediation far harder. Other researchers, including Unit 42 and CrowdStrike, have tracked the same group under names like DeceptiveDevelopment and Famous Chollima, emphasizing its persistence and creativity in using social engineering to achieve its goals.

What defenders should do

Organizations can take several steps to reduce exposure to attacks like this. Security awareness is the first line of defense. Employees should be trained to treat unsolicited recruiter messages with caution, especially those that push conversations to private messaging apps. Verifying recruiters through corporate domains and official staff listings can help distinguish legitimate outreach from malicious attempts.

Technical controls are equally important. Developer machines should not run arbitrary code received from unknown sources. Companies should enforce package policies that only allow dependencies from verified registries and trusted maintainers. Continuous monitoring of endpoints is also critical. Signs of JavaScript runtimes making unusual network calls to blockchain APIs, or processes accessing browser extension data and wallet files, should be investigated immediately.

For organizations handling cryptocurrency or sensitive intellectual property, additional hardening is necessary. Require hardware wallets for all funds and enforce multi-factor authentication on password managers and developer accounts. Implement strict network controls that block known malicious contract addresses and flag unusual connections to blockchain explorers or RPC endpoints. Combining these steps with modern endpoint detection and response tools will reduce the likelihood of compromise.

Broader implications

Experts warn that the use of EtherHiding by North Korean hackers is not an isolated development. Other state-backed groups could begin experimenting with similar methods, especially those with financial motives. Decentralized platforms have long been promoted as resistant to censorship and takedowns, but this campaign shows how the same features can be abused. As blockchain adoption grows, so too does its potential misuse as an infrastructure for cybercrime and espionage.

For defenders, the lesson is clear. Cybersecurity strategies can no longer focus solely on traditional hosting or phishing domains. Monitoring blockchain activity, contract interactions, and the ecosystems that developers rely on will be crucial. The evolution of UNC5342’s tactics highlights a growing convergence between financial crime, state-backed espionage, and decentralized technology abuse, making this one of the most significant developments in recent cyber threat activity.

Sean Doyle

Sean is a distinguished tech author and entrepreneur with over 20 years of extensive experience in cybersecurity, privacy, malware, Google Analytics, online marketing, and various other tech domains. His expertise and contributions to the industry have been recognized in numerous esteemed publications. Sean is widely acclaimed for his sharp intellect and innovative insights, solidifying his reputation as a leading figure in the tech community. His work not only advances the field but also helps businesses and individuals navigate the complexities of the digital world.

More Reading

Post navigation

Leave a Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.