North Korea’s New Onchain Cyber Weapon
Google’s Threat Intelligence Group (GTIG) has revealed that state-backed North Korean hackers are pioneering a new blockchain-based hacking method dubbed “EtherHiding.”
Instead of storing malware on traditional web servers, hackers are now embedding malicious code directly inside smart contracts on public blockchains like Ethereum and BNB Chain. Because blockchain data is immutable, the payloads become permanent and censorship-resistant, making the attacks nearly impossible to dismantle.
This technique essentially turns decentralized networks into covert delivery systems for malicious payloads, marking a dangerous shift in how cyberattacks are deployed and hidden online.
How EtherHiding Works
The attack chain typically starts with compromised WordPress websites - a favorite target of North Korean hackers. Using stolen credentials or weak plugins, attackers inject just a few lines of JavaScript into the site’s code.
When users visit the infected page, the script silently connects to a blockchain smart contract, retrieves the embedded malware, and executes it locally - all without leaving a trace or generating onchain transaction fees.
Because the data lives permanently on the blockchain, traditional cybersecurity tools can’t simply “take down” the source.
GTIG traced EtherHiding activity back to September 2023, linked to a campaign called CLEARFAKE, which used fake browser update prompts to trick victims into downloading infected software.
Pyongyang’s Expanding Cyber Arsenal
The discovery comes as North Korea intensifies its cyber operations in 2025. According to blockchain intelligence firm TRM Labs, the regime’s hacking units have stolen over $1.5 billion in cryptocurrency this year alone - funds widely believed to be diverted into nuclear weapons development and sanction evasion.
Analysts believe EtherHiding represents an evolution in Pyongyang’s tactics - from theft and laundering to onchain exploitation and malware distribution.
The Risk of “Self-Spreading” Onchain Attacks
Security experts fear that EtherHiding could soon evolve into autonomous malware systems leveraging AI for replication and adaptation. These systems might one day target wallets, smart contract infrastructure, or even validator nodes, compromising the very backbone of blockchain networks.
Unlike traditional malware, decentralized infections can’t simply be patched or removed - they live on public ledgers indefinitely.
The situation underscores the growing paradox of decentralization: the same transparency and permanence that protect blockchain users can also empower adversaries who exploit those properties for malicious purposes.
Google Urges Vigilance as Blockchain Becomes the Battlefield
GTIG’s report concludes with a stark warning for web developers and blockchain companies:
- Audit onchain data for unusual or obfuscated smart contract code.
- Monitor web scripts closely for hidden blockchain calls.
- Educate developers about decentralized malware risks.
As the lines between web security and blockchain infrastructure blur, experts say the next wave of cyber warfare will be fought directly onchain - with blockchains themselves as both the tool and the target.



