North Korean state-sponsored hackers slip unremovable malware inside blockchains to steal cryptocurrency — EtherHiding embeds malicious JavaScript payloads in smart contracts on public blockchains
Google reports DPRK group UNC5342 uses EtherHiding to deliver backdoors and steal crypto, marking the first nation-state use of a tactic designed for resistant attacks.

A North Korean state-sponsored hacking crew is now using public blockchains to host malicious payloads, according to new research from Google’s Threat Intelligence Group (GTIG). The campaign, which leverages a technique known as “EtherHiding,” is the first documented case of a nation-state actor adopting smart contract malware delivery to evade detection and disrupt takedowns.
Google attributes the activity to UNC5342, a group it links to the long-running “Contagious Interview” operation targeting developers and cryptocurrency professionals. First observed using EtherHiding in February 2025, UNC5342’s latest toolkit includes a JavaScript downloader dubbed JADESNOW, which fetches and executes a backdoor, INVISIBLEFERRET, directly from data stored on BNB Smart Chain and Ethereum smart contracts.
The group’s payload delivery mechanism hinges on read-only blockchain calls. These requests don’t produce new transactions or leave visible trails in blockchain analytics tools, and because the contracts themselves are immutable, defenders can’t remove the embedded scripts.
In practical terms, the technique allows threat actors to update or swap malware payloads by rewriting contract storage variables on-chain, all without needing to re-compromise distribution sites or clients. While financially motivated actors have previously used this infrastructure, Google says this marks the first time it has seen a state-sponsored crew fold the technique into its operational toolkit.
Google’s report ties the blockchain infrastructure to real-world infections delivered through compromised WordPress sites and social engineering lures, including fake job interviews designed to bait crypto developers. Victims who land on these sites receive the JADESNOW loader, which then reaches out to the on-chain smart contracts, retrieves a JavaScript payload, and runs it locally. That payload in turn launches INVISIBLEFERRET — a full-featured backdoor with remote control that enables long-term espionage and data theft.
While Google does not specify how smart contract data was retrieved, previous EtherHiding research has shown that attackers often rely on standard JSON-RPC calls, which may traverse public or hosted infrastructure. Blocking those services or forcing clients to use self-hosted nodes with policy restrictions could offer interim containment. On the browser side, organizations can enforce strict extension and script execution policies and lock down update workflows to prevent fake Chrome-style alerts from gaining traction.
Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.

Luke James is a freelance writer and journalist. Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory.
-
bit_user I don't claim to understand the precise details of how this supposedly works, but I think it seems to follow a trend of malware quickly exploiting the addition of scripting that seems to find its way into virtually every new technology under the sun.Reply -
edzieba
The scripting ('smart contract') on the blockchain itself has little do with any any exploits: what the hackers are doing is using a blockchain as a host to store data, and that data happens to be the actual malware payload. A separately distributed piece of malware acts as a 'loader' that performs the actual exploit at the target device then downloads the payload (hosted on the blockchain) to execute it.bit_user said:I don't claim to understand the precise details of how this supposedly works, but I think it seems to follow a trend of malware quickly exploiting the addition of scripting that seems to find its way into virtually every new technology under the sun.
The only slightly novel things about this is that:
1) unlike a 3rd party host (e.g. Google drive) or self-host (a server somewhere) there is nobody to contact to 'take down' data stored on the blockchain.
2) The on-chain scripting allows for the payload to be swapped out without updating the exploit to point to a new host.
However, (1) is achievable to hosting in one of many other ways that is not so trivial to take down (e.g. at a Tor address, using a bittorrent swarm, hosting a server in a nation that will not comply with your takedown demands, etc), and (2) can be achieved by having the exploit look for the payload at an address that you can re-point at will (e.g. a URL). -
jerramie Bomb them into the stone age every time they do this shit. Not the people but the dictatorship. Soon they will get tired of living 45 miles underground and stop stealingReply -
TheyStoppedit
That's been tried. The U.S. tried to liberate the citizens in the 50s. Them cornholes from China took sides with the enemy, the war ended in a stalement, Korea was split down the middle. One is a developed country. The other is North Korea. They have nukes now, and have tightened security and are still friends with Russia and China. If the west tries to liberate the citizens again, it will start WW3 because Russia and China will keep standing up for evil. The only way this ends is if all the citizens in NK all rise up all at the same time and overthrow the government like what happened to the Soviet Union. I don't find it likely. There truly is likely no end to this dumpster fire. The best we can do on our side is tighten security in digital infrastructure so the lying, cheating, and stealing can maybe stopjerramie said:Bomb them into the stone age every time they do this shit. Not the people but the dictatorship. Soon they will get tired of living 45 miles underground and stop stealing -
jp7189
FTSCon is happening today. It's not a huge conference, but it packs in some of the most elite incident response folks in the world. Last year, North Korea's increasing capabilities were a frequent topic. There were enough details to make it clear that NK (and not somebody else posing as NK) has been getting advanced and clever and aggressive on the world stage of hacking.3en88 said:"North Korean Hackers" - aka American hackers using North Korea as cover. -
bit_user
I just need to point out a major flaw in your account of its underpinnings.TheyStoppedit said:One is a developed country. The other is North Korea.
https://en.wikipedia.org/wiki/Korean_War#Prelude_to_war_(1950)
The DPRK is not an example of what I think is the broader point you're trying to make.