Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

State-Sponsored Hackers Use Blockchains as Bulletproof Hosts

Image © Arstechnica
Researchers report that North Korea-backed groups are distributing malware by embedding payloads in smart contracts on Ethereum and the BNB Smart Chain, creating a resilient, hard-to-take-down hosting environment known as EtherHiding.

Two hacking groups, including a North Korea–linked unit, have begun using EtherHiding to distribute malware by embedding payloads inside smart contracts on public blockchains such as Ethereum and the BNB Smart Chain. Google Threat Intelligence Group researchers say this technique creates a portable, resilient form of “bulletproof” hosting that is difficult for authorities to remove.

EtherHiding relies on smart contracts that automatically enforce terms when specified conditions are met. Because these contracts live on decentralized networks, there is no central portal to delete the code or takedown the payload, complicating attempts at takedowns by law enforcement and security researchers alike.

The approach offers several advantages over traditional malware delivery methods. It can reduce hosting costs while spreading components across multiple blockchains, enabling operators to update payloads by modifying contract logic and making transaction histories harder to trace back to individuals.

Researchers say UNC5342, a North Korea–backed group, has used JadeSnow to stage infections and retrieve later-stage payloads from both Ethereum and the BNB chain. A second group, UNC5142, has also been observed employing EtherHiding, highlighting how actors are adapting blockchain technology to sustain operations and complicate attribution.

Analysts note this development underscores North Korea’s growing cyber capabilities. Elliptic recently reported that the regime has stolen cryptocurrency valued at more than $2 billion in 2025, illustrating the scale at which adversaries may leverage blockchain ecosystems for illicit gain, including malware distribution and related activities.

 

Arstechnica

Notícias relacionadas

TI Brasil cresce 18,5% em 2025 impulsionado por IA
Zaaz adquire carteira Online Telecom
Receita cria Curador de IA para monitorar vieses
DeepSeek sofre interrupção de 7 horas
Espírito Santo investe em nuvem própria e data center
Phishing 2026: Alertas Falsos Roubam Senhas

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais