Hackers Exploit EtherHiding Technique to Facilitate XRP, BNB, Shiba Inu, Other Crypto Thefts: Report

Ndianabasi Tom
6 Min Read

North Korean (DPRK) threat actors are turning to a powerful new blockchain-based method called EtherHiding to steal XRP, Shiba Inu (SHIB), Binance Coin (BNB), and other digital assets.

This is the first time Google Threat Intelligence Group (GTIG) has observed a nation-state actor using this kind of attack to facilitate crypto thefts.

The discovery adds a new layer of concern to the ongoing wave of crypto-targeted hacks, showing how threat actors are evolving to bypass traditional security defenses.

What is EtherHiding?

EtherHiding is a stealthy new approach that uses public blockchains as a resilient command-and-control (C2) layer for malware. The technique was first spotted in September 2023 as part of the CLEARFAKE campaign tracked as UNC5142).

It embeds malicious JavaScript payloads into smart contracts on public blockchains chains like BNB Smart Chain, XRP Ledger and Ethereum.

This allows attackers to host malicious code on a decentralized ledger, a code that’s hard to take down and easy to call from a victim’s browser.

Unlike normal malware that depends on centralized infrastructure, EtherHiding leverages decentralized networks. This makes it nearly impossible for law enforcement to detect.

Moreover, the attackers can update the malicious code at any time, maintaining continuous access to infected systems.

How EtherHiding Works

Below is a simple, step-by-step view of how EtherHiding attacks typically unfold, according to the GTIG report:

Step 1: Initial compromise via social engineering or site breaches

Attackers usually open the door through social engineering like fake job interviews, fraudulent crypto-games, or recruitment lures that target developers.

In some CLEARFAKE cases, the criminals first compromise a legitimate website (often WordPress) using stolen credentials or software flaws. That hacked site becomes the delivery platform.

Step 2: A loader script is injected into the compromised site

The attacker plants a small “loader” JavaScript snippet on the breached site. When a visitor loads the page, this loader runs in the browser and is responsible for reaching out to the blockchain to fetch the real malicious code.

Step 3: The loader fetches payloads from smart contracts using read-only calls

Rather than sending on-chain transactions, the loader performs a read-only call (for example, eth_call) to a smart contract where the attacker has hidden the JavaScript payload.

Because read-only calls don’t write to the ledger, they leave little trace and avoid gas fees, making the fetch quiet and cheap for the attacker.

Step 4: Payload executes and attackers move in

Once the loader downloads the payload, it runs in the victim’s environment. The delivered code can do many things: show fake login or browser-update overlays to steal credentials, install info-stealing malware, or drop persistent backdoors.

In the CLEARFAKE campaign, these stages supported multi-platform infections that targeted Windows, macOS, and Linux systems.

Read also: 8 Common Crypto Scams and How To Avoid Them

Targeting Crypto Developers Through Fake Jobs

The campaign, dubbed “Contagious Interview,” focuses on developers in the crypto and tech industries.

Hackers pretend to be recruiters from legitimate companies and approach potential victims through Telegram and Discord.

They offer fake job interviews or coding tests, which are actually malware delivery traps. Once the victim downloads and opens the file, their system is compromised, giving hackers access to sensitive information and crypto wallets.

This campaign uses several multi-stage malware variants, including:

  • JADESNOW – for initial access and system compromise.
  • BEAVERTAIL – for persistence and information stealing.
  • INVISIBLEFERRET – for deeper network infiltration.

These malware strains are capable of infecting Windows, macOS, and Linux systems, allowing attackers to maintain long-term control of networks and steal stored crypto assets.

A New Cybersecurity Challenge

According to the report, EtherHiding represents a “next-generation bulletproof hosting” model. In essence, hackers avoid using servers that authorities can shut down by storing malicious code in smart contracts.

The attack uses read-only functions on the blockchain, which means no actual transactions are recorded on the ledger. This helps them stay under the radar and avoid detection.

Related: What is Cryptojacking? How You Can Protect Yourself

How You Can Protect Yourself

Security experts warn that social engineering is a major entry point for these kinds of attacks. Here are practical steps to reduce risk:

  • Verify recruiters and company domains before any job interview.
  • Avoid downloading coding tests or software from unverified links.
  • Use strong endpoint protection and keep devices updated.
  • Enable multi-factor authentication on wallets and accounts.
  • Monitor wallet activity regularly for suspicious behavior.

The EtherHiding campaign is a stark reminder of how blockchain technology can be used for both good and bad. By blending advanced malware with decentralized infrastructure, North Korean hackers are raising the stakes in the fight against crypto theft.

For crypto holders, developers, and anyone in the digital asset ecosystem, staying vigilant against fake recruiters and malicious links has never been more critical.

Share This Article
Follow:
Ndianabasi Tom is an experienced crypto journalist, content writer, editor and SEO specialist with a background in petroleum engineering. Having immersed himself in the blockchain and cryptocurrency space since 2018, he’s known for translating complex concepts into accessible analysis for a global audience. Outside of work, he’s a lifelong learner and creative spirit. He's passionate about singing, crime films, reading, and football. Ndianabasi Tom is the founder of Nitadel.