Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
North Korean Hackers Deploy Blockchain-Based Tools in Expanding Global Cyber Campaign

North Korean Hackers Deploy Blockchain-Based Tools in Expanding Global Cyber Campaign

BeInCryptoBeInCrypto2025/10/16 21:06
By:Shigeki Mori

North Korea-linked threat actors are escalating their cyber operations using decentralized and evasive malware tools, according to new findings from Cisco Talos and Google Threat Intelligence Group. The campaigns aim to steal cryptocurrency, infiltrate networks, and evade detection through sophisticated job recruitment scams. Evolving Malware Techniques Reflect Expanding Capabilities Cisco Talos researchers identified an ongoing

North Korea-linked threat actors are escalating their cyber operations using decentralized and evasive malware tools, according to new findings from Cisco Talos and Google Threat Intelligence Group.

The campaigns aim to steal cryptocurrency, infiltrate networks, and evade detection through sophisticated job recruitment scams.

Evolving Malware Techniques Reflect Expanding Capabilities

Cisco Talos researchers identified an ongoing campaign by the North Korean group Famous Chollima. The group has used two complementary malware strains, BeaverTail and OtterCookie. These programs, traditionally used for credential theft and data exfiltration, have now evolved to integrate new functionalities and closer interoperation.

In a recent incident involving an organization in Sri Lanka, attackers lured a job seeker into installing malicious code disguised as part of a technical evaluation. Even though the organization itself was not a direct target, Cisco Talos analysts also observed a keylogging and screenshotting module linked to OtterCookie, which highlights the broader risk to individuals involved in fake job offers. This module covertly recorded keystrokes and captured desktop images, automatically transmitting them to a remote command server.

Cisco Talos reports that the North Korean group Famous Chollima is using a new JavaScript module combining BeaverTail and OtterCookie for keylogging and screenshots, targeting job seekers through fake offers and malicious Node.js packages. #CyberSecurity

— Cyber_OSINT (@Cyber_O51NT)

This observation underscores the ongoing evolution of North Korea-aligned threat groups and their focus on social engineering techniques to compromise unsuspecting targets.

Blockchain Used as a Command Infrastructure

Google’s Threat Intelligence Group (GTIG) identified an operation by a North Korea-linked actor, UNC5342. The group used a new malware called EtherHiding. This tool hides malicious JavaScript payloads on a public blockchain, turning it into a decentralized command and control (C2) network.

By using blockchain, attackers can change malware behavior remotely without traditional servers. Law enforcement takedowns become much harder. Furthermore, GTIG reported that UNC5342 applied EtherHiding in a social engineering campaign called Contagious Interview, which had been previously identified by Palo Alto Networks, demonstrating the persistence of North Korea-aligned threat actors.

What is EtherHiding?It's a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).

— blackorbird (@blackorbird)

Targeting Job Seekers to Steal Cryptocurrency and Data

According to Google researchers, these cyber operations typically begin with fraudulent job postings aimed at professionals in the cryptocurrency and cybersecurity industries. Victims are invited to participate in fake assessments, during which they are instructed to download files embedded with malicious code.

The infection process often involves multiple malware families, including JadeSnow, BeaverTail, and InvisibleFerret. Together, they let attackers access systems, steal credentials, and deploy ransomware efficiently. The end goals range from espionage and financial theft to long-term network infiltration.

Cisco and Google have published indicators of compromise (IOCs) to help organizations detect and respond to ongoing North Korea-linked cyber threats. These resources provide technical details for identifying malicious activity and mitigating potential breaches. Researchers warn that the integration of blockchain and modular malware will likely continue to complicate global cybersecurity defense efforts.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Exchanges Call on SEC: Deny Exemptions to Maintain Fairness in the Market

- WFE warns SEC against broad crypto exemptions for tokenized stocks, citing risks to investor protections and market integrity. - Tokenized stocks lack dividend rights, voting access, and custody frameworks, creating "mimicked products" with weaker safeguards. - SEC's sandbox-style exemptions risk regulatory arbitrage, allowing crypto platforms to bypass rules enforced on traditional exchanges. - Global bodies like IOSCO warn tokenization amplifies data integrity and custody risks, urging unified standard

Bitget-RWA2025/11/30 23:04
Exchanges Call on SEC: Deny Exemptions to Maintain Fairness in the Market

Decentralized AI Network Cocoon Takes on Centralized Titans with a Privacy-Centric Approach

- Telegram founder Pavel Durov launched Cocoon, a TON-based decentralized AI network enabling GPU owners to earn cryptocurrency by processing private AI requests. - The platform challenges centralized providers like Amazon and Microsoft by using Trusted Execution Environments (TEEs) to ensure secure, verifiable model execution with user data privacy. - Cocoon connects GPU providers with developers for confidential tasks, reducing reliance on costly intermediaries while aligning with ethical AI principles t

Bitget-RWA2025/11/30 23:04
Decentralized AI Network Cocoon Takes on Centralized Titans with a Privacy-Centric Approach

Ethereum News Update: Fusaka Upgrade Signals New Era of Unified Scaling for Ethereum

- Ethereum's Fusaka upgrade (Dec 3, 2025) introduces PeerDAS and BPO forks to enhance scalability via reduced data verification costs and incremental rollup capacity expansion. - Gas limit raised to 60M through "Pump The Gas" initiative lowers fees and congestion, while L2 data costs could drop 40-60% to boost developer adoption. - EIP-7917/7951 improves security and UX with deterministic finality and P-256 signatures, aligning Ethereum with fintech standards while reducing node storage demands. - Upgrade

Bitget-RWA2025/11/30 22:44
Ethereum News Update: Fusaka Upgrade Signals New Era of Unified Scaling for Ethereum

UAE's regulatory initiatives set the stage for a surge in institutional DeFi adoption

- DWF Labs commits $75M to DeFi projects enhancing institutional-grade infrastructure across Ethereum , BNB Chain, and Solana . - UAE's new Central Bank Law mandates licensing for DeFi protocols, balancing innovation with regulatory oversight and consumer protection. - Doma Protocol and ORA introduce liquid domain trading and cash-flow-driven models, expanding DeFi's functional scope beyond speculative tokenomics. - Institutional adoption faces hurdles including regulatory uncertainty, smart contract risks

Bitget-RWA2025/11/30 22:26
UAE's regulatory initiatives set the stage for a surge in institutional DeFi adoption