Close Menu
CoinslopesCoinslopes
    Facebook X (Twitter) Instagram
    CoinslopesCoinslopes
    Trending
    • Billionaire Tim Draper Leads $3.2M Seed Round For Ryder To Replace Seed Phrases With TapSafe Recovery
    • YouTube Star MrBeast Files Trademark for Crypto Exchange and Payments Service
    • Stripe’s Tempo Blockchain Raises $500 Million, Poaches Prominent Ethereum Dev
    • CZ Fires Back at Peter Schiff’s Latest Bitcoin Criticism
    • Bitcoin Dips Below $105K But US Banking Stress Eases
    • North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts
    • Bank of England’s £20,000 stablecoin cap sends ‘terrible signal’ to crypto, says Lord – DL News
    • Why Wintermute and Other Market Makers Stopped Trading During Bitcoin Crash, $19B Liquidation
    • Home
    • Bitcoin
    • Exchanges
    • Press Release
    • Crypto Startups
    • DeFi Ecosystem
    • Token Insights
    • Ethereum
    • NFT & Metaverse
    CoinslopesCoinslopes
    Home»NFT & Metaverse»North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts
    NFT & Metaverse

    North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts

    adminBy adminOctober 17, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    North Korea Hackers Embed Sophisticated Code Exploit in Smart Contracts
    Share
    Facebook Twitter LinkedIn Pinterest Email

    North Korean hackers have adopted a method of deploying malware designed to steal crypto and sensitive information by embedding malicious code into smart contracts on public blockchain networks, according to Google’s Threat Intelligence Group.

    The technique, called “EtherHiding,” emerged in 2023 and is typically used in conjunction with social engineering techniques, such as reaching out to victims with fake employment offers and high-profile interviews, directing users to malicious websites or links, according to Google.

    Hackers will take control of a legitimate website address through a Loader Script and embed JavaScript code into the website, triggering a separate malicious code package in a smart contract designed to steal funds and data once the user interacts with the compromised site.

    Simplified illustration of how the “EtherHiding” hack works. Source: Google Cloud

    The compromised website will communicate with the blockchain network using a “read-only” function that does not actually create a transaction on the ledger, allowing the threat actors to avoid detection and minimize transaction fees, Google researchers said.

    The report highlights the need for vigilance in the crypto community to keep users safe from scams and hacks commonly employed by threat actors attempting to steal funds and valuable information from individuals and organizations alike.

    Related: CZ’s Google account targeted by ‘government-backed’ hackers

    Know the signs: North Korea social engineering campaign decoded

    The threat actors will set up fake companies, recruitment agencies and profiles to target software and cryptocurrency developers with fake employment offers, according to Google.

    After the initial pitch, the attackers move the communication to messaging platforms like Discord or Telegram and direct the victim to take an employment test or complete a coding task.

    “The core of the attack occurs during a technical assessment phase,” Google Threat Intelligence said. During this phase, the victim is typically told to download malicious files from online code repositories like GitHub, where the malicious payload is stored.