North Korean state-sponsored hackers slip unremovable malware inside blockchains to steal cryptocurrency — EtherHiding embeds malicious JavaScript payloads in smart contracts on public blockchains

Blockchain illustration
(Image credit: Getty / Eugene Mymrin)

A North Korean state-sponsored hacking crew is now using public blockchains to host malicious payloads, according to new research from Google’s Threat Intelligence Group (GTIG). The campaign, which leverages a technique known as “EtherHiding,” is the first documented case of a nation-state actor adopting smart contract malware delivery to evade detection and disrupt takedowns.

Google attributes the activity to UNC5342, a group it links to the long-running “Contagious Interview” operation targeting developers and cryptocurrency professionals. First observed using EtherHiding in February 2025, UNC5342’s latest toolkit includes a JavaScript downloader dubbed JADESNOW, which fetches and executes a backdoor, INVISIBLEFERRET, directly from data stored on BNB Smart Chain and Ethereum smart contracts.

The group’s payload delivery mechanism hinges on read-only blockchain calls. These requests don’t produce new transactions or leave visible trails in blockchain analytics tools, and because the contracts themselves are immutable, defenders can’t remove the embedded scripts.

Google’s report ties the blockchain infrastructure to real-world infections delivered through compromised WordPress sites and social engineering lures, including fake job interviews designed to bait crypto developers. Victims who land on these sites receive the JADESNOW loader, which then reaches out to the on-chain smart contracts, retrieves a JavaScript payload, and runs it locally. That payload in turn launches INVISIBLEFERRET — a full-featured backdoor with remote control that enables long-term espionage and data theft.

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Google Preferred Source

Luke James
Contributor

Luke James is a freelance writer and journalist.  Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory. 

  • bit_user
    I don't claim to understand the precise details of how this supposedly works, but I think it seems to follow a trend of malware quickly exploiting the addition of scripting that seems to find its way into virtually every new technology under the sun.
    Reply
  • 3en88
    "North Korean Hackers" - aka American hackers using North Korea as cover.
    Reply
  • edzieba
    bit_user said:
    I don't claim to understand the precise details of how this supposedly works, but I think it seems to follow a trend of malware quickly exploiting the addition of scripting that seems to find its way into virtually every new technology under the sun.
    The scripting ('smart contract') on the blockchain itself has little do with any any exploits: what the hackers are doing is using a blockchain as a host to store data, and that data happens to be the actual malware payload. A separately distributed piece of malware acts as a 'loader' that performs the actual exploit at the target device then downloads the payload (hosted on the blockchain) to execute it.
    The only slightly novel things about this is that:
    1) unlike a 3rd party host (e.g. Google drive) or self-host (a server somewhere) there is nobody to contact to 'take down' data stored on the blockchain.
    2) The on-chain scripting allows for the payload to be swapped out without updating the exploit to point to a new host.
    However, (1) is achievable to hosting in one of many other ways that is not so trivial to take down (e.g. at a Tor address, using a bittorrent swarm, hosting a server in a nation that will not comply with your takedown demands, etc), and (2) can be achieved by having the exploit look for the payload at an address that you can re-point at will (e.g. a URL).
    Reply
  • jerramie
    Bomb them into the stone age every time they do this shit. Not the people but the dictatorship. Soon they will get tired of living 45 miles underground and stop stealing
    Reply
  • TheyStoppedit
    jerramie said:
    Bomb them into the stone age every time they do this shit. Not the people but the dictatorship. Soon they will get tired of living 45 miles underground and stop stealing
    That's been tried. The U.S. tried to liberate the citizens in the 50s. Them cornholes from China took sides with the enemy, the war ended in a stalement, Korea was split down the middle. One is a developed country. The other is North Korea. They have nukes now, and have tightened security and are still friends with Russia and China. If the west tries to liberate the citizens again, it will start WW3 because Russia and China will keep standing up for evil. The only way this ends is if all the citizens in NK all rise up all at the same time and overthrow the government like what happened to the Soviet Union. I don't find it likely. There truly is likely no end to this dumpster fire. The best we can do on our side is tighten security in digital infrastructure so the lying, cheating, and stealing can maybe stop
    Reply
  • jp7189
    3en88 said:
    "North Korean Hackers" - aka American hackers using North Korea as cover.
    FTSCon is happening today. It's not a huge conference, but it packs in some of the most elite incident response folks in the world. Last year, North Korea's increasing capabilities were a frequent topic. There were enough details to make it clear that NK (and not somebody else posing as NK) has been getting advanced and clever and aggressive on the world stage of hacking.
    Reply
  • bit_user
    TheyStoppedit said:
    One is a developed country. The other is North Korea.
    I just need to point out a major flaw in your account of its underpinnings.
    https://en.wikipedia.org/wiki/Korean_War#Prelude_to_war_(1950)
    The DPRK is not an example of what I think is the broader point you're trying to make.
    Reply