Saturday, January 31, 2026

Russia’s Transfer of Nuclear Technology to North Korea Raises Pentagon Concerns

South Korean intelligence reports suggest Russia may have supplied North Korea with nuclear submarine modules, enhancing its military capabilities.

TRUST BETRAYED: Psychological Counselor’s PC Hacked To Launch Attack On Vulnerable North Korean Youth

North Korean hackers target Android devices, employing phishing tactics to remotely wipe data and exploit Google's tracking features.

Despite Broad Selloff, NVIDIA Posts 1% Gain Fueled by AI Growth

U.S. stocks fell due to inflation fears, but NVIDIA rose amid Amazon's $100 billion AI investment, while other chip stocks declined.

Untraceable Terror: Kim’s Hackers Perfect New ‘EtherHiding’ Cyber Attack Using Blockchain

NorthKoreaUntraceable Terror: Kim’s Hackers Perfect New 'EtherHiding' Cyber Attack Using Blockchain
 News1
 News1

On October 17, Google’s Threat Intelligence Group (GTIG) disclosed that they had uncovered evidence of a North Korean-affiliated hacking group, known as UNC5342, employing a novel blockchain-based attack method to pilfer cryptocurrencies and gather sensitive information.

GTIG’s report detailed that UNC5342 exploited a cutting-edge malware concealment technique dubbed EtherHiding. This method repurposes public blockchains as command and control channels. The report explains that EtherHiding stores and disseminates malicious payloads through decentralized blockchain networks, rather than conventional centralized servers. This approach renders the command delivery routes virtually impervious to blockades and makes tracing nearly impossible.

The report emphasizes that this marks the first documented instance of such sophisticated technology being deployed by state-sponsored cyber operatives.

 Figure 1: UNC5342 EtherHiding on BNB Smart Chain and Ethereum / Google Cloud Blog Screenshot
 Figure 1: UNC5342 EtherHiding on BNB Smart Chain and Ethereum / Google Cloud Blog Screenshot

GTIG’s analysis reveals that UNC5342 executed a social engineering campaign, christened Contagious Interview by Palo Alto Networks, to dupe developers into unwittingly installing malware.

The attack vector compromised victims’ systems through an intricate, multi-stage infection process, targeting a range of operating systems including Windows, macOS, and Linux.

The hackers ingeniously stored malicious command codes on immutable blockchain ledgers, accessing them in read-only mode to maintain persistent, anonymous remote control. They adeptly circumvented security measures by dynamically swapping out payloads as needed.

GTIG’s assessment concludes that this case demonstrates UNC5342’s capability to effectively neutralize blocking attempts through EtherHiding, enabling them to sustain prolonged cyber offensives.

Robert Wallace, who heads Google Cloud’s Mandiant Consulting division, warns that state-sponsored hacking groups are leveraging increasingly adaptable malware to outmaneuver law enforcement responses. He underscores that this development signals an escalating complexity and intensity in the cybersecurity threat landscape.

Check Out Our Content

Check Out Other Tags:

Most Popular Articles