Close Menu
maincoin.money
    What's Hot

    BTC, ETH, XRP, BNB Recovering Gains

    October 20, 2025

    Analysts Suggest Price Held Down as Early Bitcoin Investors Cash Out

    October 20, 2025

    Are Major Investors Betting Long or Short on BTC and ETH?

    October 20, 2025
    Facebook X (Twitter) Instagram
    maincoin.money
    • Home
    • Altcoins
    • Markets
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
      • Regulation
    Facebook X (Twitter) Instagram
    maincoin.money
    Home»Regulation»North Korean Hackers Use Advanced Code Vulnerabilities in Smart Contracts
    Regulation

    North Korean Hackers Use Advanced Code Vulnerabilities in Smart Contracts

    Ethan CarterBy Ethan CarterOctober 17, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    1760727100
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers from North Korea have begun using a method to deploy malware aimed at stealing cryptocurrency and sensitive information by embedding harmful code into smart contracts on public blockchain networks, as reported by Google’s Threat Intelligence Group.

    This technique, known as “EtherHiding,” surfaced in 2023 and is often paired with social engineering tactics, such as reaching out to potential victims through fake job offers and high-profile interviews, leading users to malicious websites or links, according to Google.

    Hackers gain control of a legitimate web address through a Loader Script and embed JavaScript code into the site, activating a separate malicious code package in a smart contract that aims to steal funds and data once the user interacts with the compromised website.

    North Korea, Scams, Hacks, Lazarus Group
    Illustration of how the “EtherHiding” hack functions. Source: Google Cloud

    The compromised website communicates with the blockchain network using a “read-only” function that doesn’t create a transaction on the ledger, which allows the threat actors to evade detection and reduce transaction fees, as noted by Google researchers.

    The findings emphasize the importance of vigilance within the crypto community to protect users from scams and hacking attempts aimed at stealing funds and valuable information from both individuals and organizations.

    Related: CZ’s Google account targeted by ‘government-backed’ hackers

    Recognizing the signs: North Korean social engineering strategy unveiled

    The attackers create fake companies, recruitment agencies, and profiles to entice software and cryptocurrency developers with bogus job offers, according to Google.

    Following the initial approach, the attackers shift the conversation to messaging platforms like Discord or Telegram and encourage the victim to take an employment test or complete a coding assignment.

    “The main part of the attack happens during a technical assessment phase,” Google’s Threat Intelligence stated. In this phase, the victim is usually instructed to download harmful files from online code repositories like GitHub, where the malicious payload is stored.