Close Menu
maincoin.money
    What's Hot

    Quantum Computing: Years Away from Posing a Risk to Bitcoin, Asserts VC Amit Mehra

    November 1, 2025

    Bitcoin ETFs Experience Significant Withdrawals as BTC Price Falls to $108,000

    November 1, 2025

    Bitcoin Stays in Range as Altcoins React to Spot BTC ETF Sell-off

    November 1, 2025
    Facebook X (Twitter) Instagram
    maincoin.money
    • Home
    • Altcoins
    • Markets
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
      • Regulation
    Facebook X (Twitter) Instagram
    maincoin.money
    Home»Ethereum»North Korean Hackers Integrate Advanced Code Vulnerabilities into Smart Contracts
    Ethereum

    North Korean Hackers Integrate Advanced Code Vulnerabilities into Smart Contracts

    Ethan CarterBy Ethan CarterOctober 17, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    1760732148
    Share
    Facebook Twitter LinkedIn Pinterest Email

    North Korean hackers have utilized a technique to deploy malware aimed at stealing cryptocurrency and sensitive information by incorporating harmful code into smart contracts on public blockchain networks, as reported by Google’s Threat Intelligence Group.

    This method, referred to as “EtherHiding,” surfaced in 2023 and is often combined with social engineering strategies, such as contacting victims with fraudulent job offers and prestigious interviews, directing users to harmful websites or links, according to Google.

    Hackers gain control over a legitimate website through a Loader Script and inject JavaScript code into that site, activating a separate malicious code package in a smart contract that is intended to steal funds and data as soon as the user engages with the compromised site.

    North Korea, Scams, Hacks, Lazarus Group
    Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud

    The compromised website will interact with the blockchain network using a “read-only” function that does not actually perform a transaction on the ledger, allowing the threat actors to evade detection and reduce transaction costs, Google researchers noted.

    The report emphasizes the importance of vigilance in the crypto community to protect users from scams and hacks often employed by malicious actors attempting to steal funds and valuable information from individuals and organizations alike.

    Related: CZ’s Google account targeted by ‘government-backed’ hackers

    Be aware: North Korea’s social engineering campaign analyzed

    The threat actors will establish fake companies, recruitment agencies, and profiles to target software and cryptocurrency developers with fabricated job offers, according to Google.

    After the initial outreach, the attackers shift communication to messaging platforms like Discord or Telegram and instruct the victim to undertake a job assessment or complete a coding task.

    “The core of the attack takes place during a technical evaluation phase,” Google Threat Intelligence reported. During this stage, the victim is typically told to download harmful files from online code repositories like GitHub, where the malicious payload is hosted.