How North Korean Hackers Hide Malware in Blockchain Job Scams

North Korean group UNC5342 exploits "EtherHiding" in "Contagious Interview" attacks, luring developers with fake job listings to embed malware in Ethereum and BNB Smart Chain smart contracts. This stealthy method steals credentials and crypto wallets, evading traditional detection by storing payloads in immutable blockchain code.


The attacks deploy JADESNOW to fetch payloads for in-memory execution, communicating with C2 servers for data exfiltration, and blending with legitimate Web3 activity for anonymity. It's a sophisticated evolution of state-sponsored hacking, targeting developers for maximum impact.


Protect yourself:
Verify job offers, restrict file downloads, and use advanced antivirus. Organizations should monitor blockchain interactions and enforce strict policies to counter these innovative threats from groups like UNC5342.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, Z Plus Security
- Other (43)
- Ransomware (176)
- Events and News (27)
- Features (45)
- Security (500)
- Tips (80)
- Google (40)
- Achievements (12)
- Products (37)
- Activation (7)
- Dealers (1)
- Bank Phishing (57)
- Malware Alerts (277)
- Cyber Attack (361)
- Data Backup (15)
- Data Breach (196)
- Phishing (183)
- Securty Tips (4)
- Browser Hijack (26)
- Adware (15)
- Email And Password (85)
- Android Security (92)
- Knoweldgebase (38)
- Botnet (20)
- Updates (6)
- Alert (72)
- Hacking (83)
- Social Media (10)
- vulnerability (120)
- Hacker (75)
- Spyware (16)
- Windows (19)
- Microsoft (38)
- Uber (1)
- YouTube (3)
- Trojan (7)
- Website hacks (14)
- Paytm (1)
- Credit card scam (4)
- Telegram (6)
- RAT (12)
- Bug (3)
- Twitter (3)
- Facebook (12)
- Banking Trojan (14)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (15)
- IoT Security (3)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (4)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (4)
- Cloud malware (3)
- Cloud storage (2)
- Financial fraud (96)
- Impersonation phishing (1)
- DDoS (11)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (83)
-
Mobile Frauds
(49)
- WhatsApp (14)
- AI (29)