Google Exposes North Korea’s “EtherHiding” Hack

10/20/2025
3min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert at Airdrops.com
10/20/2025
3min read
Denislav Manolov's Image
by Denislav Manolov
Crypto Expert

North Korea’s New Onchain Cyber Weapon

Google’s Threat Intelligence Group (GTIG) has revealed that state-backed North Korean hackers are pioneering a new blockchain-based hacking method dubbed “EtherHiding.”

Instead of storing malware on traditional web servers, hackers are now embedding malicious code directly inside smart contracts on public blockchains like Ethereum and BNB Chain. Because blockchain data is immutable, the payloads become permanent and censorship-resistant, making the attacks nearly impossible to dismantle.

“The same immutability that makes blockchain trustworthy is now protecting malware,” GTIG warned in its report.

This technique essentially turns decentralized networks into covert delivery systems for malicious payloads, marking a dangerous shift in how cyberattacks are deployed and hidden online.

How EtherHiding Works

The attack chain typically starts with compromised WordPress websites - a favorite target of North Korean hackers. Using stolen credentials or weak plugins, attackers inject just a few lines of JavaScript into the site’s code.

When users visit the infected page, the script silently connects to a blockchain smart contract, retrieves the embedded malware, and executes it locally - all without leaving a trace or generating onchain transaction fees.

Because the data lives permanently on the blockchain, traditional cybersecurity tools can’t simply “take down” the source.

GTIG traced EtherHiding activity back to September 2023, linked to a campaign called CLEARFAKE, which used fake browser update prompts to trick victims into downloading infected software.

“This marks a new era where threat actors are not just stealing crypto - they’re weaponizing blockchain itself,” said one GTIG analyst.

Pyongyang’s Expanding Cyber Arsenal

The discovery comes as North Korea intensifies its cyber operations in 2025. According to blockchain intelligence firm TRM Labs, the regime’s hacking units have stolen over $1.5 billion in cryptocurrency this year alone - funds widely believed to be diverted into nuclear weapons development and sanction evasion.

Analysts believe EtherHiding represents an evolution in Pyongyang’s tactics - from theft and laundering to onchain exploitation and malware distribution.

“This is early-stage research, but it’s incredibly concerning,” said John Scott-Railton, senior researcher at Citizen Lab. “If combined with AI automation, it could produce self-spreading, undetectable malware targeting blockchain infrastructure itself.”

The Risk of “Self-Spreading” Onchain Attacks

Security experts fear that EtherHiding could soon evolve into autonomous malware systems leveraging AI for replication and adaptation. These systems might one day target wallets, smart contract infrastructure, or even validator nodes, compromising the very backbone of blockchain networks.

Unlike traditional malware, decentralized infections can’t simply be patched or removed - they live on public ledgers indefinitely.

The situation underscores the growing paradox of decentralization: the same transparency and permanence that protect blockchain users can also empower adversaries who exploit those properties for malicious purposes.

Google Urges Vigilance as Blockchain Becomes the Battlefield

GTIG’s report concludes with a stark warning for web developers and blockchain companies:

  • Audit onchain data for unusual or obfuscated smart contract code.
  • Monitor web scripts closely for hidden blockchain calls.
  • Educate developers about decentralized malware risks.

As the lines between web security and blockchain infrastructure blur, experts say the next wave of cyber warfare will be fought directly onchain - with blockchains themselves as both the tool and the target.

“Blockchain was meant to decentralize trust,” one analyst wrote. “Now it’s decentralizing the threat.”
Share with your friends on social media:

Join the community and don't miss a crypto giveaway.

Subscribe for updates by e-mail with the latest research reviews, airdrop news, reward programs, event updates about upcoming airdrops.

By entering your email address you are accepting our Terms & Conditions and Privacy & Cookie Policy.