The blockchain, that magical public ledger of all things crypto, has always been celebrated for its transparency. But now, North Korean hackers have found a way to turn it into an almost unstoppable haven for malicious code. Gone are the days when crooks had to rely on dodgy hidden servers: welcome to malware served fresh, straight from the chain.
North Korean Hackers and the “EtherHiding” Tactic
Since February 2025, North Korean cybercriminals have been perfecting a groundbreaking technique for launching their digital assaults. According to researchers at Google’s Threat Intelligence Group (GTIG), these hackers have taken to embedding malware directly on the blockchain. Yes, the very backbone of cryptocurrency may now double as a smuggler’s den for malicious payloads. The GTIG team has coined this operation “EtherHiding”—a nod to the Ethereum blockchain at its core, though the Binance Smart Chain is also involved.
Traditionally, hackers would stow their malware on regular servers, which could be blocked or taken down by law enforcement and security experts with relative ease. Not so with the blockchain. Here, attackers simply create a smart contract, sneak their nasty code in as if it were just another boring data field, and hit ‘deploy.’
Why is this so problematic? Smart contracts, after all, are the backbone of decentralized finance (DeFi). They automate everything from token swaps to asset transfers, handling untold quantities of user funds. Because blockchains like Ethereum and Binance Smart Chain are open to all, anyone—from upstanding coder to shady hacker—can publish a smart contract at any time. Once the code is live, it cannot be deleted or censored. It’s essentially immortal—good news for Web3 enthusiasts, not so much for their antivirus software.
Malware That Can’t Be Silenced
Google’s team discovered that this method allows hackers not only to evade traditional takedown efforts, but also to adapt in real time. If a piece of malware is spotted, the code inside the smart contract can be tweaked or swapped out for something nastier—sometimes dozens of times, as one contract flagged by Google was updated over 20 times in its first four months online. The blockchain works like a protective shell, shielding hacker tools from censorship or deletion. In a sense, the hackers are weaponizing the openness of the blockchain itself.
This isn’t just some technical showcase—it’s currently being deployed in active crypto theft campaigns. According to Robert Wallace, one of Google’s lead researchers on the case, this development “marks an escalation in the threat landscape: state actors are now deploying unprecedented methods to distribute malware that law enforcement struggle to neutralize, and which are easily adaptable to new campaigns.”
The Human Angle: How the Hack Works
The first trap is set with fake job ads for developers—fraudulent offers from supposedly hot startup crypto firms. The hackers fabricate entire companies and create convincing professional profiles across job sites and networking platforms. When a targeted developer bites, they’re invited to an online interview.
During the session, the victim is asked to complete a “skills assessment”—which, surprise surprise, requires running a script on their own machine. That is exactly where the jaws snap shut.
- The initial script downloads another, hidden within a deployed smart contract on the blockchain.
- This brings JADESNOW onto the scene—a loader malware fetched straight from the ledger’s data.
- JADESNOW’s job? To fetch the main act: an infostealer known as InvisibleFerret.
InvisibleFerret is as sneaky as its name would suggest. The malware stalks the victim’s computer, rooting through browsers to steal saved passwords, email addresses, and even credit card information. Its favorite prey: crypto wallets like MetaMask or Phantom, popular as browser extensions among the DeFi crowd. It searches the entire machine for the private keys needed to access digital funds.
- Once it’s done, the bounty of stolen data is zipped up and secretly sent offsite, often via Telegram (using a bot or a private channel) or to a remote server.
- Armed with this treasure trove, hackers quickly drain the victim’s crypto accounts—that is the primary goal of this operation.
A Coordinated Operation With Big Payouts
Behind this slick campaign lurks a professional North Korean hacking team tracked under the code name UNC5342. Seasoned and focused, they specialize in cryptocurrency theft. Let’s not forget: North Korea’s hackers have long been considered one of the top threats to the entire crypto ecosystem. So far this year, North Korean cybercriminals have already stolen two billion dollars in digital assets. Their infamous peers, the Lazarus group, were also responsible for orchestrating the largest hack ever recorded in the crypto world—the hit on the Bybit exchange this past February.
So, the next time you see a too-good-to-be-true job offer in the crypto space, double-check those company credentials. When the blockchain becomes both paymaster and playground for cybercriminals, it pays to keep your wits (and your wallets) safer than ever—because, as it turns out, what happens on-chain doesn’t always stay on-chain.


