Friday, May 1, 2026

TOMORROW X TOGETHER Earns Two More RIAA Gold Certifications

TOMORROW X TOGETHER achieves three Gold certifications in the U.S., highlighting their rising popularity and successful world tour.

Limits of AI Call Centers: 54% of Customers Dissatisfied—Why Human Agents Are Still Preferred

AI call centers struggle with complex queries, leading to user dissatisfaction. Experts call for smarter systems to enhance customer service.

North Korea Criticizes South Korea for ‘2.3 Million Tons of CO₂’ Emissions

North Korea addresses South Korea's wildfire crisis, highlighting significant CO₂ emissions and issuing a wildfire risk alert for the region.

Untraceable Terror: Kim’s Hackers Perfect New ‘EtherHiding’ Cyber Attack Using Blockchain

NorthKoreaUntraceable Terror: Kim’s Hackers Perfect New 'EtherHiding' Cyber Attack Using Blockchain
 News1
 News1

On October 17, Google’s Threat Intelligence Group (GTIG) disclosed that they had uncovered evidence of a North Korean-affiliated hacking group, known as UNC5342, employing a novel blockchain-based attack method to pilfer cryptocurrencies and gather sensitive information.

GTIG’s report detailed that UNC5342 exploited a cutting-edge malware concealment technique dubbed EtherHiding. This method repurposes public blockchains as command and control channels. The report explains that EtherHiding stores and disseminates malicious payloads through decentralized blockchain networks, rather than conventional centralized servers. This approach renders the command delivery routes virtually impervious to blockades and makes tracing nearly impossible.

The report emphasizes that this marks the first documented instance of such sophisticated technology being deployed by state-sponsored cyber operatives.

 Figure 1: UNC5342 EtherHiding on BNB Smart Chain and Ethereum / Google Cloud Blog Screenshot
 Figure 1: UNC5342 EtherHiding on BNB Smart Chain and Ethereum / Google Cloud Blog Screenshot

GTIG’s analysis reveals that UNC5342 executed a social engineering campaign, christened Contagious Interview by Palo Alto Networks, to dupe developers into unwittingly installing malware.

The attack vector compromised victims’ systems through an intricate, multi-stage infection process, targeting a range of operating systems including Windows, macOS, and Linux.

The hackers ingeniously stored malicious command codes on immutable blockchain ledgers, accessing them in read-only mode to maintain persistent, anonymous remote control. They adeptly circumvented security measures by dynamically swapping out payloads as needed.

GTIG’s assessment concludes that this case demonstrates UNC5342’s capability to effectively neutralize blocking attempts through EtherHiding, enabling them to sustain prolonged cyber offensives.

Robert Wallace, who heads Google Cloud’s Mandiant Consulting division, warns that state-sponsored hacking groups are leveraging increasingly adaptable malware to outmaneuver law enforcement responses. He underscores that this development signals an escalating complexity and intensity in the cybersecurity threat landscape.

Check Out Our Content

Check Out Other Tags:

Most Popular Articles