• Trending
  • Comments
  • Latest
AI People joins Dubai’s innovation one — Declares war on the forgetting of humanity

AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity

07/22/2025 - Updated On 07/23/2025
FBI nabs Nigerian ‘tech queen’ Sapphire Egemasi in multi-million dollar fraud scheme

FBI arrests Nigerian ‘tech queen’ Sapphire Egemasi in $1.3M heist targeting U.S. government

06/05/2025 - Updated On 06/17/2025
Deutsche Bank eyes stablecoin launch as tokenization wave hits European banking

Deutsche Bank eyes stablecoin launch as tokenization wave hits European banking

06/09/2025 - Updated On 07/07/2025
Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

2
Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

2

Hello world!

1
Pennsylvania attorney faces trial for alleged crypto fraud as brother pleads guilty

Pennsylvania attorney faces trial for alleged crypto fraud as brother pleads guilty

10/17/2025
Ghana plans crypto regulation bill for parliament by December as regional competition intensifies

Ghana plans crypto regulation bill for parliament by December as regional competition intensifies

10/17/2025
Ripple Accelerator Program launches $200K Asia push with Tenity to fuel XRPL innovation

Ripple eyes $1 billion SPAC deal to build largest XRP-focused institutional treasury

10/17/2025
  • Trending
  • Comments
  • Latest
AI People joins Dubai’s innovation one — Declares war on the forgetting of humanity

AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity

07/22/2025 - Updated On 07/23/2025
FBI nabs Nigerian ‘tech queen’ Sapphire Egemasi in multi-million dollar fraud scheme

FBI arrests Nigerian ‘tech queen’ Sapphire Egemasi in $1.3M heist targeting U.S. government

06/05/2025 - Updated On 06/17/2025
Deutsche Bank eyes stablecoin launch as tokenization wave hits European banking

Deutsche Bank eyes stablecoin launch as tokenization wave hits European banking

06/09/2025 - Updated On 07/07/2025
Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

2
Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

2

Hello world!

1
Pennsylvania attorney faces trial for alleged crypto fraud as brother pleads guilty

Pennsylvania attorney faces trial for alleged crypto fraud as brother pleads guilty

10/17/2025
Ghana plans crypto regulation bill for parliament by December as regional competition intensifies

Ghana plans crypto regulation bill for parliament by December as regional competition intensifies

10/17/2025
Ripple Accelerator Program launches $200K Asia push with Tenity to fuel XRPL innovation

Ripple eyes $1 billion SPAC deal to build largest XRP-focused institutional treasury

10/17/2025
Friday, October 17, 2025
  • Login
The Bit Gazette
  • Home
  • Crypto News
  • Expert Analysis
  • Finance
  • Tech
  • Sponsored
  • Press Release
  • Opinion
No Result
View All Result
The Bit Gazette
No Result
View All Result
Home Crypto News

North Korea deploys blockchain-based malware that cannot be shut down, Cisco and Google report

Cybersecurity experts warn that North Korean hackers are adopting blockchain-based hacking tools to hide their tracks and evade global law enforcement detection.

by Victor Ohagwasi
3 hours ago
in Crypto News
Reading Time: 3 mins read
0
North Korea DMM Hack

North Korea DMM Hack

Share on FacebookShare on Twitter

North Korea-linked hacking groups are increasingly deploying blockchain-based hacking tools to carry out sophisticated cyberattacks, according to new analyses from Cisco Talos and Google Threat Intelligence. These attacks target individuals and global organizations through fake job recruitment campaigns designed to steal cryptocurrency, infiltrate corporate systems, and avoid traditional detection methods.

Researchers from both firms said the use of decentralized blockchain infrastructure allows hackers to operate command-and-control (C2) systems that are virtually impossible to dismantle. The development marks a major escalation in cyber warfare tactics, as traditional cybersecurity frameworks are struggling to adapt to decentralized threats.

“These actors are evolving faster than many defense systems,” said Warren Mercer, Technical Leader at Cisco Talos. “By embedding malicious code in blockchain transactions, they create a permanent, decentralized delivery network that can’t simply be taken down.”

The blockchain-based hacking tools approach has allowed North Korean operatives to maintain persistence and access to targets for months, even after infected systems are cleaned or reset.

Malware families evolving to exploit decentralized networks

Cisco Talos identified a North Korean threat group known as Famous Chollima, which has expanded its toolkit with two related malware families, BeaverTail and OtterCookie. Both are engineered to steal credentials, monitor activity, and exfiltrate sensitive data. Recent variants share overlapping modules designed to enhance stealth and inter-device communication.

In one instance, a Sri Lankan company became collateral damage after an unsuspecting job seeker was tricked into downloading a malicious “technical test.” The embedded malware secretly recorded keystrokes and screenshots before transmitting them to attacker-controlled servers.

Researchers said the infection chain demonstrated how blockchain-based hacking tools can operate indirectly through individuals, allowing hackers to bypass organizational defenses entirely.

Cisco’s report emphasized that these methods mirror the MITRE ATT&CK framework’s persistence and defense evasion techniques, illustrating how blockchain data is being exploited to conceal communications.

Blockchain as a decentralized command system

Google’s Threat Intelligence Group (GTIG) linked another North Korean cluster, UNC5342, to a new malware strain called EtherHiding. The malware stores malicious JavaScript code directly on public blockchain networks, creating a decentralized command structure that is nearly impossible to remove.

By using public smart contracts to store and retrieve payloads, EtherHiding eliminates the need for centralized infrastructure, which traditional cyber defense teams usually target. This design enables attackers to remotely modify behavior without redeploying servers or domains.

According to GTIG researchers, EtherHiding is part of a broader campaign known as “Contagious Interview,” in which victims are lured with fake job offers. Once installed, the malware can adapt dynamically by retrieving updated code segments from blockchain transactions which is a tactic leveraging the immutable nature of decentralized networks.

“Blockchain-based hacking tools represent a new frontier in cyber threats,” said Shane Huntley, Head of GTIG. “These campaigns weaponize the resilience of blockchain to maintain control indefinitely.”

To understand how blockchain data remains permanent and public, Google’s report cited the Ethereum documentation on immutability.

Global cybersecurity concerns and defensive measures

The use of blockchain-based hacking tools poses growing challenges for international cybersecurity and financial regulation. Because blockchain transactions are immutable and globally distributed, law enforcement agencies cannot easily disrupt command channels.

Organizations like the Cybersecurity and Infrastructure Security Agency (CISA) have urged companies to monitor network traffic for unusual blockchain-related activity and to train staff against targeted social engineering schemes.

Cisco Talos and Google have released detailed indicators of compromise (IOCs) to help companies detect activity linked to the BeaverTail, OtterCookie, and EtherHiding families. They also advise firms to verify job recruitment processes, restrict executable file sharing, and enhance multi-factor authentication for crypto-related systems.

Cybersecurity analysts warn that failure to adapt could allow hostile state actors to create decentralized, self-sustaining malware ecosystems beyond state control.

“These attacks show how blockchain, originally designed for transparency and trust, can be repurposed into a powerful cyber weapon,” said Mercer. “Defenders now face a decentralized enemy that can’t simply be shut down.”

As North Korea intensifies its cyber operations, the integration of blockchain-based hacking tools underscores a broader shift toward decentralized threat architectures as one that will test the limits of global cybersecurity resilience.

Tags: blockchainblockchain-based hacking toolsCryptocurrencycyber warfarecybersecurity threatdigital assetsfinancial crimeillicit financinginternational securitynorth koreasanctions evasionstate-sponsored attacks
Share196Tweet123
Victor Ohagwasi

Victor Ohagwasi

Helping Busy Founders, Startups & Creatives Tell Their Stories — Visually, Verbally & Virtually | Growth Hacker | Content Strategist | Ghostwriter | Digital Marketer | Helping Brands Rank Higher & Speak Louder

  • Trending
  • Comments
  • Latest
AI People joins Dubai’s innovation one — Declares war on the forgetting of humanity

AI People joins Dubai’s Innovation One program: Declares war on the forgetting of humanity

07/22/2025 - Updated On 07/23/2025
FBI nabs Nigerian ‘tech queen’ Sapphire Egemasi in multi-million dollar fraud scheme

FBI arrests Nigerian ‘tech queen’ Sapphire Egemasi in $1.3M heist targeting U.S. government

06/05/2025 - Updated On 06/17/2025
Deutsche Bank eyes stablecoin launch as tokenization wave hits European banking

Deutsche Bank eyes stablecoin launch as tokenization wave hits European banking

06/09/2025 - Updated On 07/07/2025
Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

Polygon Discord Channel Hacked, Throws Crypto Community in Turmoil

2
Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

Bitcoin reclaims $107,000 as Iran-Israel ceasefire cools market tensions

2

Hello world!

1
Pennsylvania attorney faces trial for alleged crypto fraud as brother pleads guilty

Pennsylvania attorney faces trial for alleged crypto fraud as brother pleads guilty

10/17/2025
Ghana plans crypto regulation bill for parliament by December as regional competition intensifies

Ghana plans crypto regulation bill for parliament by December as regional competition intensifies

10/17/2025
Ripple Accelerator Program launches $200K Asia push with Tenity to fuel XRPL innovation

Ripple eyes $1 billion SPAC deal to build largest XRP-focused institutional treasury

10/17/2025
No Result
View All Result
  • Home
  • Crypto News
  • Expert Analysis
  • Finance
  • Tech
  • Sponsored
  • Press Release
  • Opinion

Copyright © 2025 - The Bit Gazette.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?